lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <72b419d4d6c694aaf15ec8b02dc0bb91@g13net.com>
Date: Sun, 15 Jan 2012 09:49:56 -0500
From: tom <tom@...net.com>
To: <bugtraq@...urityfocus.com>
Subject: Family Connections 2.7.2 Multiple XSS

# Exploit Title: Family Connections 2.7.2 Multiple XSS
# Date: 01/14/12
# Author: G13
# CVE:  2012-0699
# Software Link: https://sourceforge.net/projects/fam-connections/
# Version: 2.7.2
# Category: webapps (php)
# Google dork: "powered by Family Connections"

##### Vulnerability #####

Family Connections 2.7.2 has multiple XSS vulnerabilities.  These 
exsist in the prayers and news sections.

For familynews.php the 'post' variable is vulnerable.

For prays.php the  'for' variable is vulnerable.

##### Vendor Notification #####

01/14/12 - Vendor Notified

##### Affected Variables #####

post=[XSS]
for=[XSS]

##### Exploit #####

The script can be added right in the page, there is no filtering of 
input.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ