lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061006013033.26854.qmail@securityfocus.com> Date: 6 Oct 2006 01:30:33 -0000 From: sec@...sg.stevenroddis.com.au To: bugtraq@...urityfocus.com Subject: TorrentFlux User-Agent XSS Vulnerability http://www.stevenroddis.com.au/2006/10/06/torrentflux-user-agent-xss-vulnerability/ Name: TorrentFlux User-Agent XSS Vulnerability Published: 2006-10-06 Critical Level: Moderate Type: Cross-Site Scripting Where: Remote Status: 0-Day Software: Torrentflux 2.1 Discoverer: Steven Roddis (http://www.stevenroddis.com.au) I gave the authors of this product a week (more than usual) just to contact me, they have failed to do so; so I am releasing this vulnerability publicly! /admin.php Line: 325 $ip_info = $ip_resolved." ".$user_agent; Useragent is not esacped. Solution: Edit source code: /admin.php Line: 325: $ip_info = htmlentities($ip_resolved)." ".htmlentities($user_agent);