################################################## # Exploit Title: Feedback form heasarc.gsfc.nasa.gov Cross Site Scripting # Date: 13/08/2012 # Author: Ryuzaki Lawlet # Web/Blog: http://justryuz.blogspot.com/ # Category: webapps # Security:RISK: High # Vendor or Software Link: # Google dork: - # Tested on: Linux ################################################## [~]Exploit/p0c : http://heasarc.gsfc.nasa.gov/cgi-bin/Feedback   [~]Proof of Concept: 1.1 he issue can be exploited by an insert on the Created Object function with script code as value. The result is the persistent execution out of the web application context.  Strings: >"< OR >"    [~]Dem0 : http://heasarc.gsfc.nasa.gov/cgi-bin/Feedback   0r  Preview http://1.bp.blogspot.com/-ysbOWx9R8YI/UChHY8XnovI/AAAAAAAAAoI/Gg6CBt43Ed4/s1600/xssl.bmp    FB : www.fb.me/justryuz  +---------------------------------------------------+    Greetz to : [ CyberSEC,Newbie3vilc063s,Rileks Crew,h3x4 Crew,C4,T3D Hackers,] [ Antuwebhunter = Sbkiller CyberSEC = Misa CyberSEC = Ben CyberSEC = Xay CyberSEC = LoneLy CyberSEC = b0ogle ] [ And all my Freinds + Malaysian + Indonesia + Gaza & Turki ] -----------------------------------------------------+