lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: 10 Jun 2006 19:52:41 -0000 From: admin@...orsecurity.de To: bugtraq@...urityfocus.com Subject: Hotbot.com - XSS vulnerability in search engine Hotbot.com - XSS vulnerability ---------------------------------------------- Type: Cross site scripting Date: June, 10th 2006 ---------------------------------------------- Credits: ---------------------------------------------- Discovered by: David "Aesthetico" Vieira-Kurz http://www.majorsecurity.de ---------------------------------------------- Vulnerability: ---------------------------------------------- I found a bug in the search-engine of Hotbot("http://hotbot.com"). Input passed to the "query" parameter in "index.php" is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Sending a malicious code will result a code working on the page that pops up... http://hotbot.com/index.php?query=[XSS CODE HERE] Examples: ---------------------------------------------- /index.php?query=<script>alert("MajorSecurity")</script> /index.php?query=3Cscript%3Ealert(document.cookie)%3C/script%3E
Powered by blists - more mailing lists