[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200406151517.i5FFH8pC029012@web179.megawebservers.com>
Date: Tue, 15 Jun 2004 15:17:07 -0000
From: "http-equiv@...ite.com" <1@...ware.com>
To: <bugtraq@...urityfocus.com>
Cc: <NTBugtraq@...tserv.ntbugtraq.com>
Subject: MAGIC XSS INTO THE DNS: coelacanth
Tuesday, June 12, 2004
The following courtesy of 'bitlance winter' adds an entirely new
dimension to the matter and also suggest some additional
peculiarities at play:
<a href='http://"><plaintext>.e-gold.com'>foo</a>
<a href='http://"><script>alert()<%
2Fscript>.e-gold.com'>foo</a>
these will inject arbitrary html and script into the site in the
context of the 'intranet zone', which means one no longer needs
to go out and setup a site with the dns issue, all one needs to
do is locate a functioning site, include their code into a
suitable url, either direct the target via that or place an
iframe elsewhere pointing to it.
Still unclear how or why this can be interpreted into the site
or through the browser.
credit: 'bitlance winter'
End Call
--
http://www.malware.com
Powered by blists - more mailing lists