lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 2 May 2011 08:30:44 -0600 From: bolok.boloke80@...il.com To: bugtraq@...urityfocus.com Subject: XSS in DEAL INFORMER Product: DEAL INFORMER Vendor: http://www.got.my ( http://www.got.my/DEAL-INFORMER/ ) Vulnerable Version: 4.8.0 Vulnerability Type: XSS (Cross Site Scripting) Risk level: Medium Credit: Hector.x90 Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the "/themes/default/header.inc.php" script to properly sanitize user-supplied input in "theme_dir" variable then register_globals on. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. The following PoC is available: http://[host]/themes/default/header.inc.php?theme_dir=%22%3E%3Cscript%3E alert%28document.cookie%29;%3C/script%3E
Powered by blists - more mailing lists