Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Target: http://portal.cgilparma.it
- [+] Emails found:
- ------------------
- fidenza@cgilparma.it
- info@cgilparma.it
- lcavalcanti@cgilparma.it
- rventura@cgilparma.it
- sunia@cgilparma.it
- informazioni@cgilparma.it
- mcosta@cgilparma.it
- flc@cgilparma.it
- fiom@cgilparma.it
- lferrari@cgilparma.it
- roalandrachecco@cgilparma.it
- mbernardi@cgilparma.it
- infosercoop@cgilparma.it
- filcams@cgilparma.it
- gbiselli@cgilparma.it
- dbarbieri@cgilparma.it
- teatro30aprile@cgilparma.it
- langhirano@cgilparma.it
- @cgilparma.it
- [+] Hosts found in search engines:
- ------------------------------------
- [-] Resolving hostnames IPs...
- 195.110.124.188:www.cgilparma.it
- 195.110.124.188:tabellesercoop.cgilparma.it
- 54.72.52.58:www.cgilsalerno.itwww.cgilparma.it
- 54.72.52.58:awww.cgilparma.it
- 195.110.124.188:730.cgilparma.it
- 54.72.52.58:fwww.cgilparma.it
- 195.110.124.188:portal.cgilparma.it
- 195.110.124.188:Portal.cgilparma.it
- 54.72.52.58:www.portal.cgilparma.it
- Vulnerabilities Discovered
- ==========================
- # 1
- Info -> Core: Multiple XSS/CSRF Vulnerability
- Versions Affected: 1.5.9 <=
- Check: /?1.5.9-x
- Exploit: A series of XSS and CSRF faults exist in the administrator application. Affected administrator components include com_admin, com_media, com_search. Both com_admin and com_search contain XSS vulnerabilities, and com_media contains 2 CSRF vulnerabilities.
- Vulnerable? N/A
- # 2
- Info -> Core: JSession SSL Session Disclosure Vulnerability
- Versions effected: Joomla! 1.5.8 <=
- Check: /?1.5.8-x
- Exploit: When running a site under SSL (the entire site is forced to be under ssl), Joomla! does not set the SSL flag on the cookie. This can allow someone monitoring the network to find the cookie related to the session.
- Vulnerable? N/A
- # 3
- Info -> Core: Frontend XSS Vulnerability
- Versions effected: 1.5.10 <=
- Check: /?1.5.10-x
- Exploit: Some values were output from the database without being properly escaped. Most strings in question were sourced from the administrator panel. Malicious normal admin can leverage it to gain access to super admin.
- Vulnerable? N/A
- # 4
- Info -> Core: Frontend XSS - HTTP_REFERER not properly filtered Vulnerability
- Versions effected: 1.5.11 <=
- Check: /?1.5.11-x-http_ref
- Exploit: An attacker can inject JavaScript or DHTML code that will be executed in the context of targeted user browser, allowing the attacker to steal cookies. HTTP_REFERER variable is not properly parsed.
- Vulnerable? N/A
- # 5
- Info -> Core: Frontend XSS - PHP_SELF not properly filtered Vulnerability
- Versions effected: 1.5.11 <=
- Check: /?1.5.11-x-php-s3lf
- Exploit: An attacker can inject JavaScript code in a URL that will be executed in the context of targeted user browser.
- Vulnerable? N/A
- # 6
- Info -> Core: Path Disclosure Vulnerability
- Versions effected: Joomla! 1.5.3 <=
- Check: /?1.5.3-path-disclose
- Exploit: Crafted URL can disclose absolute path
- Vulnerable? N/A
- # 7
- Info -> Core: User redirected Spamming Vulnerability
- Versions effected: Joomla! 1.5.3 <=
- Check: /?1.5.3-spam
- Exploit: User redirect spam
- Vulnerable? N/A
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement