Security
Headlines
HeadlinesLatestCVEs

Headline

NetArt Media Blog LITE 2.1 Cross Site Scripting

NetArt Media Blog LITE version 2.1 suffers from a persistent cross site scripting vulnerability.

Packet Storm
#sql#xss#vulnerability#web#php#auth
┌┌───────────────────────────────────────────────────────────────────────────────────────┐││                                     C r a C k E r                                    ┌┘┌┘                 T H E   C R A C K   O F   E T E R N A L   M I G H T                  ││└───────────────────────────────────────────────────────────────────────────────────────┘┘ ┌────              From The Ashes and Dust Rises An Unimaginable crack....          ────┐┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                  [ Vulnerability ]                                   ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘:  Author   : CraCkEr                                                                    :│  Website  : https://www.netartmedia.net/blog-lite                                      ││  Vendor   : NetArt Media                                                               ││  Software : Blog LITE 2.1                                                              ││  Vuln Type: Stored XSS                                                                 ││  Impact   : Manipulate the content of the site                                         ││                                                                                        ││────────────────────────────────────────────────────────────────────────────────────────││                                                                                       ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘:                                                                                        :│  Release Notes:                                                                        ││  ═════════════                                                                         ││  Allow Attacker to inject malicious code into website, give ability to steal sensitive ││  information, manipulate data, and launch additional attacks.                          ││                                                                                        │┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                                                                      ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘   Greets:    The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09           CryptoJob (Twitter) twitter.com/0x0CryptoJob     ┌┌───────────────────────────────────────────────────────────────────────────────────────┐┌┘                                    © CraCkEr 2023                                    ┌┘└───────────────────────────────────────────────────────────────────────────────────────┘┘## Stored XSS---------------------------------------------------------POST /blog/index.php HTTP/2-----------------------------401019026540470155022776857270Content-Disposition: form-data; name="title"[XSS Payload]-----------------------------401019026540470155022776857270Content-Disposition: form-data; name="content"-----------------------------401019026540470155022776857270Content-Disposition: form-data; name="author"[XSS Payload]-----------------------------401019026540470155022776857270Content-Disposition: form-data; name="email"-----------------------------401019026540470155022776857270## Steps to Reproduce:1. Visit Any Category on the Blog2. Write a comment (as Guest)3. Inject your [XSS Payload] in "Comment Title"4. Inject your [XSS Payload] in "Your Name"5. Submit6. By default the Blog Disable your comment for Admin Check7. Admin Check the [BLOG POSTS] in the Administration Panel on this Path (https://website/blog/admin/index.php?page=posts)8. When the Admin check the comments on this Path (https://website/blog/admin/index.php?page=comments&id=2)9. XSS Will Fire and Executed on his Browser[-] Done

Packet Storm: Latest News

ABB Cylon Aspect 3.08.01 Remote Code Execution