lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031107012553.8299.qmail@sf-www2-symnsj.securityfocus.com> Date: 7 Nov 2003 01:25:53 -0000 From: David Ferreira <iamroot@...temsecure.org> To: bugtraq@...urityfocus.com Subject: OpenAutoClassifieds XSS attack Critical: Less critical Impact: Cross Site Scripting Where: From remote Software: OpenAutoClassifieds 1.x Vendor: http://jonroig.com/freecode/openautoclassifieds/ Description: A vulnerability has been identified in OpenAutoClassifieds, which can be exploited by malicious people to conduct Cross-Site Scripting attacks. The vulnerabily is caused due to missing validation of input supplied to the "listing" parameter in "friendmail.php". This can be exploited by including arbitrary HTML or script code in the parameter, which will cause it to be executed in a user's browser session when viewed. Example: http://[victim]/openautoclassifieds/friendmail.php?listing=<script>alert(document.domain);</script> The vulnerability has been confirmed in version 1.0. Solution: Filter malicious input in a HTTP proxy or firewall with URL filtering capabilities. Edit the source code to ensure that user input is properly validated. Reported by / credits: David Sopas Ferreira, SystemSecure.org.
Powered by blists - more mailing lists