[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <122827b90601201031p16198b59r3e50c288c1b3654d@mail.gmail.com>
Date: Fri Jan 20 18:31:43 2006
From: stan.bubrouski at gmail.com (Stan Bubrouski)
Subject: MBT Xss vulnerability
Well I'm not going to talk about how XSS is useless because we all
know it can be quite a serious problem. I think, and I don't know the
guy so I can't be sure, the original dissenter to this post was
pointing out that:
What would you phish from a site that doesn't have any forms anyways?
What would stealing a session cookie get you if the only dynamic
content is a search function?
I'm not saying XSS isn't important, I'm just wondering why this case is?
-sb
On 1/20/06, Jerome Athias <jerome.athias@...e.fr> wrote:
> Hey guy, do you know something about XSS
> 1) Phishing?
> 2) encoded URL, UTF8...?
> 3) cookie steal?
> ...
>
> it'll not be difficult to reproduce a website and have an url difficult
> to understand for a basic user...
> sure it's harder to spoof the url in the browser...
> //
>
> Native.Code a ?crit :
> > What a lame vulnerability it is. If your POC redirects to another site
> > (which is not MBT site), how someone will become victim and believe that
> > he/she is doing business with MBT?
> >
> > Your post is yet another proof that FD is more and more inhibited by scipt
> > kiddies. Get a life!
> >
>
>
> ---------------------------------------------------------------------------------------------------------
> About FD:
> "Speech is silver, but silence is gold"
>
>
> /JA
> /https://www.securinfos.info/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
Powered by blists - more mailing lists