[<prev] [next>] [day] [month] [year] [list]
Message-ID: <46F7FFE1.6050809@gmail.com>
Date: Mon, 24 Sep 2007 19:20:17 +0100
From: pagvac <unknown.pentester@...il.com>
To: bugtraq@...urityfocus.com,
full-disclosure-bounces@...ts.grok.org.uk
Subject: Google Urchin password theft madness
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
There is a trivially exploitable XSS vul on Google Urchin Web Analytics
5's login page. The vulnerability has been tested on versions 5.6.00r2,
v5.7.01, 5.7.02 and 5.7.03 (latest). Previous versions are most likely
to be affected as well.
I know that you're sick of XSS PoCs that only open alert boxes. So I
crafted a exploit URL that will steal the victim's username and password
by simply clicking on it:
http://www.gnucitizen.org/blog/google-urchin-password-theft-madness
PS: demo video included!
- --
pagvac
[http://gnucitizen.org, http://ikwt.com/]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (MingW32)
iD8DBQFG9//fjXB4hX6OC/cRAnchAJ4k9U4i8ZW1Cf8CjbNuivYlCHqjCQCeIVyj
oZ2fz06792VVGEkfpPwjCMs=
=Uz1y
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists