################################################################################################ [+] Title : Kahf Poems V1.0 (guestbook.php) SQL Injection [+] Name : Kahf Poems [+] Affected Version : v1.0 [+] Software Link : http://www.traidnt.net/vb/traidnt19736/ [+] Tested on : (L):Vista & Windows Xp and Windows 7 [+] Date : 13/08/2011 [+] Dork : "intitle:Kahf Poems -> v 1.0 beta" & "inurl:guestbook.php?diwan_id=" ################################################################################################# [+] Author : Yassin Aboukir [+] Contact : 01Xp01@Gmail.com [+] Site : http://www.yaboukir.com ################################################################################################# [+] Error : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '\',10' at line 1 [+] How to exploit : http://localhost/Path/guestbook.php?diwan_id=8&action=view&offset=1[SQL HERE] [+] Fix : upgrade to last release (v3) [+] Special Thanks to Ayoub Aboukir & All Friends ... [+] Demos : http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=1' http://www.yaaam.com/poems/guestbook.php?diwan_id=8&action=view&offset=5860' ################################################################################################ [+] Title : Kahf Poems V1.0 (guestbook.php) Persistent XSS [+] Name : Kahf Poems [+] Affected Version : v1.0 [+] Software Link : http://www.traidnt.net/vb/traidnt19736/ [+] Tested on : (L):Vista & Windows Xp and Windows 7 [+] Date : 13/08/2011 [+] Dork : "intitle:Kahf Poems -> v 1.0 beta" & "inurl:guestbook.php?diwan_id=" ################################################################################################# [+] Author : Yassin Aboukir [+] Contact : 01Xp01@Gmail.com [+] Site : http://www.yaboukir.com ################################################################################################# [+] Details : Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables attackers to inject client-side script into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same origin policy. [+] How to exploit : 1- Go there : http://localhost/Path/guestbook.php?action=addnew&diwan_id=1 . 2- Put in Body field the XSS Code. Example 1: . Example 2: 3- Put anything in the other field ( Name & E-mail). 4- Now anyone go to the guestbook page will redirected to your own paege OR exploit your XSS Code. [+] Fix : upgrade to last release. [+] Special Thanks to Ayoub Aboukir & All Friends ... [+] Demos : http://www.yaaam.com/poems/guestbook.php?diwan_id=1&action=view&offset=0 http://www.alalarja.com/poems/guestbook.php?diwan_id=1&action=view&offset=0