lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <63219edc0601061250x4bc5aefdm35bac0bf17a25f30@mail.gmail.com>
Date: Fri Jan  6 20:51:06 2006
From: mbytesecurity.org at gmail.com (Mbyte Security)
Subject: SimpBook "message" Remote Cross-Site Scripting
	Vulnerability

Listen little bastard ...  why dont you post the afected piece of code???
this "technical" description is not so technical ... its sucks! (like you)

And what kinda XSS allows "arbitrary execution of script code in the
security contextt of an affected website"  Did you ever known the meaning of
"cross site scripting" and how is the relation betwn webserver and
browser...


I wanna attach a pic of you and another of pan-zorra

--
Megabyte
http://mbytesecurity.org
El Dios de la Red
Saludos a mi ex-zorra Pandora, que me pone cuernos
Zeus,Cairo,Redpoint,x0p0x and all lame band



On 1/6/06, zeus olimpusklan <zeus.olimpusklan@...il.com> wrote:
>
>
> ###########################################################################
> # Advisory #5 Title: SimpBook "message" Remote Cross-Site Scripting
> Vulnerability
> #
> #
> # Author: 0o_zeus_o0
> # Contact: zeus@...sdelared.com
> # Website: Elitemexico.org
> # Date: 05/01/2006
> # Risk: High
> # Vendor Url:      http://codegrrl.com/scripts/simpbook/
> # Affected Software: SimpBook
> # Non Affected:
> #
> # We Are: olimpus klan team
> #
> #TECHNICAL INFO
> #================================================================
> #
> #An input validation vulnerability in SimpBook has been reported, which
> can be exploited
> #
> #by remote users to conduct cross-site scripting attacks.
> #
> #User-supplied input passed to the "message" field isn't sanitised before
> being stored in
> #
> #the guestbook. This can be exploited to execute arbitrary script code in
> the security context
> #
> #of an affected website, as a result the code will be able to access any
> of the target user's
> #
> #cookies, access data recently submitted by the target user via web form
> to the site, or take
> #
> #actions on the site acting as the target user.
> #
> #Successful exploitation requires that "html_enable" is set to "on" in "
> config.php".
> #
> #This is set to"on" in the default installation.
> #
> #Solution:
> #
> #Set "html_enable" to "off" in " config.php" or edit the source code to
> ensure that input is properly sanitised.
> #
> #
> #VULNERABLE VERSIONS
> #================================================================
> #SimpBook version 1.0. Other versions may also be affected.
> #
> #
> #================================================================
> #Contact information
> #0o_zeus_o0
> #zeus@...sdelared.com
> #www.olimpusklan.org
> #================================================================
> #greetz: lady fire, fraude, xoxo, El_Mesias
>
> ##############################################################################
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060106/5006872c/attachment-0001.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: zeus2.jpg
Type: image/jpeg
Size: 21070 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060106/5006872c/zeus2-0001.jpg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: MVC-004S.JPG
Type: image/jpeg
Size: 29187 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060106/5006872c/MVC-004S-0001.jpe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ