lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070120080608.12707.qmail@securityfocus.com> Date: 20 Jan 2007 08:06:08 -0000 From: Advisory@...a-security.net To: bugtraq@...urityfocus.com Subject: SMF "index.php?action=pm" Cross Site-Scripting #Aria-Security Team #http://Aria-Security.com #Type:Remote Cross-Site Scripting #Article on XSS: http://aria-security.net/xss.rar #Discovered By Aria-Security Team #Tested on SMF 1.1 RC3 # #Explanation: # #-First of all user must be REGISTERED #-Go to http://target/smf/index.php?action=pm;sa=send #-Inster your xss code for the recipient or BCC #-Press send. Original Advisory: http://aria-security.com/forum/showthread.php?p=128