[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1B5V7R-0007G5-00@uranium.btinternet.com>
Date: Mon, 22 Mar 2004 19:30:03 +0000
From: "Richard Maudsley" <r.i.c.h@...penworld.com>
To: support@...ntext.com
Cc: bugtraq@...urityfocus.com, full-disclosure@...ts.netsys.com
Subject: Centrinity FirstClass HTTP Server Cross Site Scripting
Product: FirstClass HTTP Server
Developer: Centrinity
URL: http://www.centrinity.com
Description: Injected code is rendered in the context of the vulnerable
page.
Exploit:
http://[TARGET]/.Templates/Commands/Upload.shtml?TargetName=<script>alert('XSS')</script>
It may be possible to steal cookies from users who are logged into the
system.
It is likely that other pages are also vulnerable.
As usual, OpenText will not follow up this report, and it can be filed away
with numerous other unpatched FirstClass bugs, hacks and exploits:
http://search.securityfocus.com/swsearch?query=firstclass&metaname=swishtitle
Enjoy,
Richard Maudsley
www.mindblock.org
hey, jaw :)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists