Home PHPJabbers Travel Tours Script 1.0
Post
Cancel

PHPJabbers Travel Tours Script 1.0

There is a cross-site scripting vulnerability in version 1.0 of the PHPJabbers Travel Tours Script.

1
SHA-256 | 0a7f5b626d6393bcc255133a21566a6f163578785f29510c84d73418a28fd1fe
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
    ┌┌───────────────────────────────────────────────────────────────────────────────────────┐
    ││                                     C r a C k E r                                    ┌┘
    ┌┘                 T H E   C R A C K   O F   E T E R N A L   M I G H T                  ││
    └───────────────────────────────────────────────────────────────────────────────────────┘┘
    
     ┌────              From The Ashes and Dust Rises An Unimaginable crack....          ────┐
    ┌┌───────────────────────────────────────────────────────────────────────────────────────┐
    ┌┘                                  [ Vulnerability ]                                   ┌┘
    └───────────────────────────────────────────────────────────────────────────────────────┘┘
    :  Author   : CraCkEr                                                                    :
      Website  : PHPJabbers.com                                                             
      Vendor   : PHPJabbers                                                                 
      Software : PHPJabbers Travel Tours Script 1.0                                         
      Vuln Type: Reflected XSS                                                              
      Impact   : Manipulate the content of the site                                         
                                                                                            
    │────────────────────────────────────────────────────────────────────────────────────────│
                                                                                           ┌┘
    └───────────────────────────────────────────────────────────────────────────────────────┘┘
    :                                                                                        :
      Release Notes:                                                                        
      ═════════════                                                                         
      The attacker can send to victim a link containing a malicious URL in an email or      
      instant message can perform a wide variety of actions, such as stealing the victim's  │
    │  session token or login credentials                                                    │
    │                                                                                        │
    ┌┌───────────────────────────────────────────────────────────────────────────────────────┐
    ┌┘                                                                                      ┌┘
    └───────────────────────────────────────────────────────────────────────────────────────┘┘
    
    Greets:
    
        The_PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL
    
      CryptoJob (Twitter) twitter.com/CryptozJob
    
    ┌┌───────────────────────────────────────────────────────────────────────────────────────┐
    ┌┘                                    © CraCkEr 2023                                    ┌┘
    └───────────────────────────────────────────────────────────────────────────────────────┘┘
    
    Path: /front.php
    
    /front.php?controller=pjListings&action=pjActionListings&listing_search=[XSS]&view=[XSS]&season=[XSS]&price_from=[XSS]&price_to=[XSS]&rating_from=[XSS]&rating_to=[XSS]
    
    /front.php?controller=pjListings&action=pjActionRegister&view=[XSS]&direction=[XSS]&listing_search=[XSS]
    
    /front.php?controller=pjListings&action=pjActionListings&listing_search=[XSS]&view=[XSS]&season=[XSS]&pjPage=[XSS]
    
    
    GET parameter 'listing_search' is vulnerable to XSS
    
    GET parameter 'view' is vulnerable to XSS
    
    GET parameter 'season' is vulnerable to XSS
    
    GET parameter 'direction' is vulnerable to XSS
    
    GET parameter 'price_from' is vulnerable to XSS
    
    GET parameter 'price_to' is vulnerable to XSS
    
    GET parameter 'pjPage' is vulnerable to XSS
    
    GET parameter 'rating_from' is vulnerable to XSS
    
    GET parameter 'rating_to' is vulnerable to XSS
    
    
    URL parameter to XSS
    
    /front.php/[XSS]?controller=pjListings&action=pjActionRegister&view=[XSS]t&direction=[XSS]&listing_search=[XSS]
    
    
    [-] Done


Source :   https://packetstormsecurity.com

This post is licensed under CC BY 4.0 by the author.