exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

vikingboard-xss.txt

vikingboard-xss.txt
Posted Jul 26, 2007
Authored by Lostmon | Site lostmon.blogspot.com

Vikingboard version 0.1.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4152f6d418d3657569e6f20922d2c74245012db460756216c446753cdd84ecee

vikingboard-xss.txt

Change Mirror Download
#################################################
Vikingboard multiple Cross site scripting
Vendor url: https://vikingboard.com/
advisore:https://lostmon.blogspot.com/2007/07/
vikingboard-multiple-cross-site.html
vendor notify:yes exploit include:yes
#################################################


Vikingboard is a PHP-based community board designed by
the principle of "less is more", and features a powerful
web-based extension-system, a lighting-fast cache system
and dynamic web update. Small, but incredibly fast and powerful.



Vikingboard contains a flaw that allows a remote cross site
scripting attack.This flaw exists because the application does
not validate multiple params upon submission to multiple scripts
.This could allow a user to create a specially crafted URL that
would execute arbitrary code in a user's browser within the
trust relationship between the browser and the server,
leading to a loss of integrity.



################
versions
################

Vikingboard 0.1.2


################
Solution:
################

No solution was available at this time !!!

################
TimeLine
################

Discovered: 20-07-2007
vendor notify: 25-07-2007
vendor response:
disclosure:25-07-2007


#####################
Examples
#####################


https://localhost/viking/cp.php?mode=9&id=2[XSS-CODE]
https://localhost/viking/cp.php?mode=7&f=1[XSS-CODE]
https://localhost/viking/cp.php?mode=6"e=1[XSS-CODE]
https://localhost/viking/cp.php?mode=12&act=[XSS-CODE]

https://localhost/viking/user.php?u=2[XSS-CODE]
https://localhost/viking/help.php?act=guidelines[XSS-CODE]


we can call the debug parameter to obtain sensitive information.


https://localhost/viking/post.php?mode=00&f=1[XSS-CODE]&poll=0

wen send a private message the field "Message Title " is affected

https://localhost/viking/cp.php?mode=6

we can send a PM with a malformed XSS title to others users
and it is executed wen the vicims go to Inbox on his control panel

https://localhost/viking/cp.php?mode=7&f=1

https://localhost/viking/report.php?p=2[XSS-CODE]


https://localhost/viking/topic.php?t=2&s=0[XSS-CODE]

https://localhost/viking/post.php?mode=03&t=2"e=2[XSS-CODE]
https://localhost/viking/post.php?mode=03&t=2[XSS-CODE]"e=2
https://localhost/viking/post.php?mode=00&f=1&poll=0[XSS-CODE]

https://localhost/viking/post.php?mode=02&p=2[XSS-CODE]

https://localhost/viking/search.php?search=user:administrator&act=dosearch

if the user has any script code in the first lines of any post
wen try fo find all post by this user , and wen the applications
show the results it is executed

##################### €nd ##############################

--
atentamente:
Lostmon (lostmon@gmail.com)
Web-Blog: https://lostmon.blogspot.com/
Google group: https://groups.google.com/group/lostmon (new)
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close