lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060517030155.4701.qmail@securityfocus.com>
Date: 17 May 2006 03:01:55 -0000
From: mail@...usemreyilmaz.com
To: bugtraq@...urityfocus.com
Subject: Boastmachine Cross Site Scripting Vulnerability


Advisory      : Cross Site Scripting in Boastmachine (http://boastology.com/)
Release Date  : 17/05/2005
Last Modified : 17/05/2005
Author        : Yunus Emre Yilmaz ( http://yns.zaxaz.com)
Application   : BoastMachine v3.1 ( maybe older versions)
Risk          : High

Problem : Form action values in admin.php and index.php (maybe other pages) isn't properly sanitized before being returned to page.Form action value
is otomatically coming from $_SERVER["PHP_SELF"];.And This is changeable from query string.

If I access page like admin.php/XSS $_SERVER["PHP_SELF"] returns as admin.php/XSS.So , an attacker basicly inject malicious
HTML/JS codes into page.

Proof Of Concept : admin.php/"><script>alert('xss')</script>

Solution : Edit the source code , and change it $_SERVER["SCRIPT_NAME"] or filter it before printing in page.

Original Advisory : http://yns.zaxaz.com/advisories/bostmachine.txt


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ