forked from 1979139113/0day-today-exploits
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path10066.txt
59 lines (55 loc) · 2.38 KB
/
10066.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
Theeta CMS (Cross Site Scripting,SQL Injection) Multiple Vulnerabilities
========================================================================
##################################################################
#
# [1]-Cross Site Scripting
#
# Vulnerability Description:
# Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web
applications which allow code #injection by malicious web users into the web pages viewed by other users.
#
# Affected items:
# http://server/community/thread.php?start=[XSS]
# http://server/community/thread.php?forum=[XSS]
# http://server/community/thread.php?cat=[XSS]
# http://server/community/forum.php?start=[XSS]
# http://server/community/forum.php?cat=[XSS]
# http://server/blog/index.php?start=[XSS]
#
#
# Exemple: <script>alert(document.cookie)</script>
#
# The Risk:
# By exploiting this vulnerability, an attacker can inject malicious code in the script and can stole cookies.
#
# Fix the vulnerability:
# * Encode output based on input parameters.
# * Filter input parameters for special characters.
# * Filter output based on input parameters for special characters...
#
#################################################################
#
# [2]-SQL injection
#
# Vulnerability Description:
# SQL injection is a code injection technique that exploits a security vulnerability occurring in the
string literal escape characters embedded in SQL #statements or user input is not strongly typed and thereby
unexpectedly executed.
#
# Affected items:
# http://server/community/forum.php?start=[SQL Injection]
# http://server/community/thread.php?start=[SQL Injection]
# http://server/blog/index.php?start=[SQL Injection]
#
# Exemple: -1+ORDER+BY+1-- [You can find the number of colums (Well just incrementing the number until we get an
error.)]
#
# The Risk:
# By exploiting this vulnerability, an attacker can inject malicious code in the script and can have acces to the
database.
#
# Fix the vulnerability:
# To protect against SQL injection, user input must not directly be embedded in SQL statements. Instead,
#
#################################################################
#################################################################