Advertisement
xGHOSTSECx

Lebanese Gov Website Exploits

Aug 4th, 2021
469
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.75 KB | None | 0 0
  1. Vulnerable component: jquery v1.5.1
  2. [!] Component location: https://www.cnss.gov.lb//modules/mod_klixo_articles_slider/assets/jquery-1.5.1.min.js
  3. [!] Total vulnerabilities: 4
  4. [!] Summary: XSS with location.hash
  5. [!] Severity: medium
  6. [!] CVE: CVE-2011-4969
  7. [!] Summary: 3rd party CORS request may execute
  8. [!] Severity: medium
  9. [!] CVE: CVE-2015-9251
  10. [!] Summary: jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution
  11. [!] Severity: low
  12. [!] CVE: CVE-2019-11358
  13. [!] Summary: Selector interpreted as HTML
  14. [!] Severity: medium
  15. [!] CVE: CVE-2012-6708
  16.  
  17. If I decided to attack Lebanon I would start by leaking my entry point to create a diversion.
  18. #TheRealGhostSec
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement