Sijio Community Software Cross Site Scripting / SQL Injection

2010-07-08T00:00:00
ID PACKETSTORM:91599
Type packetstorm
Reporter Sid3 effects
Modified 2010-07-08T00:00:00

Description

                                        
                                            `########################################################  
# I'm SiD3^effects member from Inj3ct0r Team #  
# Support e-mail : submit[at]inj3ct0r.com #  
########################################################  
Name : Sijio Community Software SQLi/Persistent XSS Vulnerability  
Date : july, 7 2010  
Critical Level : HIGH  
Vendor Url : http://www.sijio.com/  
Google Dork: © Powered by sijio - Community Software  
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>  
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,KeDar,Sonic,gunslinger_  
greetz to :www.topsecure.net ,All ICW members and my friends :) luv y0 guyz  
#######################################################################################################  
Xploit:SQLi Vulnerability  
  
DEMO URL : http://server/gallery/?parent=[SQLi]  
########################################################################################################  
Xploit:Persistent XSS Vulnerability  
  
The following script has persistent xss vuln in the blog section.  
Step 1: Register :D  
  
Step 2: Goto your blog section and post your new evil blog :P  
  
Demo url :http://server/my_blogs/  
  
Post your evil xss content in the blog section and the url is http://www.axlex.com/edit_blog/  
  
Attack Pattern :">><marquee><h1>XSS3d By Sid3^effects</h1><marquee>  
Step 3 : Now goto the main page,check the blog section and the url is http://www.axlex.com/blogs/ and find your evil script:P  
  
The attacker can injected evil xss script in the blog section :D  
########################################################################################################  
# 0day no more  
# Sid3^effects  
  
`