Joomla! Component Rapid-Recipe - Persistent Cross-Site Scripting

EDB-ID:

14327

CVE:

N/A




Platform:

PHP

Date:

2010-07-10


1               ##########################################             1
0               I'm Sid3^effects member from Inj3ct0r Team             1
1               ##########################################             0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

Name : Joomla Rapid Recipe Persistent XSS Vulnerability
Date : july, 11 2010
Critical Level 	: HIGH
Vendor Url : http://www.rapid-source.com/
Author : Sid3^effects aKa HaRi <shell_c99[at]yahoo.com>
special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,KeDar,Sonic,gunslinger_
greetz to :www.topsecure.net ,All ICW members and my friends :) luv y0 guyz 
#######################################################################################################
Xploit:Persistent Xss Vulnerability

Step 1 : Register

Step 2 : GOto "ADD RECIPE" option 

Demo Url:http://server/recipes/add-recipe.html

Step 3 : The attacker can post thier xss script in the description area.

Attack pattern : ">><marquee><h1>XSS3d By Sid3^effects</h1><marquee> 

Step 4 : Once done,go check your evil recipe ;).The location would be 
           
          http://site.com/recipes/[ur evil recipe name.html]

########################################################################################################
# 0day no more 
# Sid3^effects