Feedback heasarc.gsfc.nasa.gov XSS

##################################################
# Exploit Title: Feedback form heasarc.gsfc.nasa.gov Cross Site Scripting
# Date: 13/08/2012
# Author: Ryuzaki Lawlet
# Web/Blog: http://justryuz.blogspot.com
# Category: webapps
# Security:RISK: High
# Vendor or Software Link:
# Google dork: -
# Tested on: Linux
##################################################

[~]Exploit/p0c :

http://heasarc.gsfc.nasa.gov/cgi-bin/Feedback

[~]Proof of Concept:

1.1
he issue can be exploited by an insert on the Created Object function with script code as value.
The result is the persistent execution out of the web application context.

[~]Dem0 :

http://heasarc.gsfc.nasa.gov/cgi-bin/Feedback
http://1.bp.blogspot.com/-ysbOWx9R8YI/UChHY8XnovI/AAAAAAAAAoI/Gg6CBt43Ed4/s1600/xssl.bmp

FB : www.fb.me/justryuz
+---------------------------------------------------+
Greetz to :
[ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,]
[ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ]
[ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ]
-----------------------------------------------------+

Postingan terkait:

Belum ada tanggapan untuk "Feedback heasarc.gsfc.nasa.gov XSS"

Post a Comment