lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 6 Aug 2004 18:03:52 -0400
From: <root@...ffomatic64.com>
To: <bugtraq@...urityfocus.com>
Subject: Type xxs


Vendor : typepad.com
URL : http://typepad.com
Risk : Cross site scripting

Description: TypePad is a powerful, hosted weblogging service that gives
users the richest set of features to immediately share and publish
information -- like travel logs, journals and digital scrapbooks -- on
the Web. TypePad lets people communicate, publicly or privately, with
the audience of their choosing.



Cross site scripting: The filtering script for the name form doesnt
filter " if preceeded by a ?. The cross site scripting works because the
<a href=" tag can be closed by a target url with " which then permits
the user to use such oneventhandles as onmouseover.

Solution: The easiest way would be to just replace all characters with
their &#xx; equivilant.

Credits: Credits goto my loving fiance, you push me todo things i never
thought possible.

Exploit: This is exploited by passing a url with malicious javascript to
the name variable.

Spiffomatic64
Hacking is an art-form




-Matt Oyer
Spiffomatic64.com






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ