exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

uphotogallery-xss.txt

uphotogallery-xss.txt
Posted Feb 6, 2007
Authored by DoZ | Site hackerscenter.com

Uphotogallery version 1.1 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 59252f18f2ce50937d9715492ada82d603c7e61eefec55763422383eacaeefa6

uphotogallery-xss.txt

Change Mirror Download
Uphotogallery Multiple Cross-Site Scripting Vulnerability


Uphotogallery has been developed to run exclusively on web sites hosted on Windows Servers with Internet Information Server 4.0 or higher and ASP 3.0 installed. No other Platforms are supported. Uphotogallery supports both Microsoft Access and Microsoft Sql Server databases. This may help the attacker steal cookie-based authentication credentials and launch other attacks. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. Cross-site request forgery, also known as one click attack or session riding and abbreviated as CSRF or XSRF, is a kind of malicious exploit of websites. Although similar-sounding in name to cross-site scripting (XSS), it is a very different and almost opposite form of attack. Whereas cross-site scripting exploits the trust a user has in a website, a cross-site request forgery exploits the trust a Web site has in a user by forging a request f
rom a trusted user. Compared to XSS attacks, CSRF attacks are often less popular (so there are fewer defense resources available) and more difficult to defend against, and thus are considered to be more dangerous.




Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz


Remote: Yes
Local: Yes
Class: Cross-Site Scripting


Version: Uphotogallery 1.1
vendor: www.uapplication.com




Attackers can exploit these issues via a web client.



Remote XSS: http://www.example.com/path/Uphotogallery/thumbnails.asp?ci=75&s=XSS

Local Admin: http://www.example.com/path/Uphotogallery/images_archive.asp?ci=71&s=XSS


These Pages Contail XSS Vul Forms.

- thumbnails.asp
- images_archive.asp



Demo: http://www.uapplication.com/demo/Uphotogallery/thumbnails.asp


Security researcher? Join us: mail Zinho at zinho at hackerscenter.com
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close