lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <000101c4b0d9$9b0a45b0$6500a8c0@spiff>
Date: Wed, 13 Oct 2004 00:03:31 -0400
From: "Matthew Oyer" <root@...ffomatic64.com>
To: <bugtraq@...urityfocus.com>
Subject: XXS in fusetalk forum


Vendor : fusetalk
URL : http://www.fusetalk.com/
Version: 4.0
Risk : Cross site scripting
 
Description: Fusetalk is a discussion forum solution that provides a
powerful and simple method of web-based collaboration.
 
 
Cross site scripting: The filtering script for the img src= doesnt
filter " if preceeded by a ?. The cross site scripting works because the
<img src=" tag can be closed by a target url with " which then permits
the user to use such oneventhandles as onmouseover.
 
Solution: The easiest way would be to just replace all characters with
their &#xx; equivilant.
 
Credits: Credits goto my loving fiance, you push me todo things i never
thought possible.
 
Exploit: This is exploited by passing a img src with malicious
javascript.
 
Spiffomatic64
Hacking is an art-form
 




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ