Advertisement






Dragonfly CMS 9.0.6.1 and prior XSS

CVE Category Price Severity
CWE-79 $500 Critical
Author Risk Exploitation Type Date
Unknown High Remote 2006-08-23
CPE PURL
cpe:cpe:/a:dragonfly_cms:dragonfly_cms:9.0.6.1 pkg:pkg:exploitalert/[email protected]
Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006080103

Below is a copy:

## HeLiOsZ - Dark End Team - Internet Security Team
## Dragonfly CMS 9.0.6.1 and prior XSS

## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & 
http://www.darkend.org
## Rish : Medium
## Type : web applet

## Creator: http://www.cpgnuke.com/

## Exploit:
- The vuln is in the search section,it don't validate the imput.
  To exploit this vuln you simply need an Internet Browser,you must only use 
a cookie
  logger to get the Portal cookies.
  To know if it is vulnerable: <script>alert('This is an XSS 
Vulnerability')</script>

## Dork: Interactive software released under GNU GPL, Code Credits, Privacy 
Policy

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum