header-logo
Suggest Exploit
vendor:
Joke Website Script
by:
Valentin Hoebel
8,8
CVSS
HIGH
SQL Injection and Cross-Site Scripting
89 (SQL Injection) and 79 (Cross-Site Scripting)
CWE
Product Name: Joke Website Script
Affected Version From: unknown
Affected Version To: unknown
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Joke Website Script SQL Injection and Cross-Site Scripting Vulnerabilities

The Joke Website Script is vulnerable to SQL injection and Cross-Site Scripting. An attacker can inject malicious SQL code into the 'keyword' parameter of the 'search.php' script to execute arbitrary SQL commands in the back-end database. An attacker can also inject malicious JavaScript code into the 'keyword' parameter of the 'search.php' script to execute arbitrary JavaScript code in the browser of the victim.

Mitigation:

Input validation should be used to prevent SQL injection and Cross-Site Scripting attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

[:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::]
>> General Information 
Advisory/Exploit Title = Joke Website Script SQL Injection and Cross-Site Scripting Vulnerabilities
Author = Valentin Hoebel
Contact = valentin@xenuser.org


[:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::]
>> Product information
Name = Joke Website Script
Author = Ed Pudol
Link = http://www.buymyscripts.net/8/Joke_website_script_with_a_20_thousand+_jokes_database_included.html
Affected Version(s) = unknown

 
[:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::]
>> #1 SQL Injection
target/search.php?submit=Search&keyword=[SQLi]

>> #2 Cross-Site Scripting
target/search.php?submit=Search&keyword=[XSS]

[:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::]
>> Additional Information
Advisory/Exploit Published = 14.06.2010


[:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::]
>> Misc
Greetz = cr4wl3r, JosS
<3 packetstormsecurity.org!


[:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::]