[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <dd5f5ac90804150907yab4919aid2a9f3ddc65585d0@mail.gmail.com>
Date: Tue, 15 Apr 2008 18:07:57 +0200
From: "Thomas Pollet" <thomas.pollet@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: gallarific backdoored , vulnerable to xss
Hello,
I was looking at the free version of gallarific, and I found some suspicious
code in the scopbin directory.
Attached is a file I found in the zip i downloaded, in case someone wants to
decode it.
the package can be downloaded from
http://www.gallarific.com/download.php
Also, the software contains several xss flaws:
1) When modifying a user his email address like
h@...om"><script>alert(1);</script>
persistent xss wil occur when viewing gadmin/users.php or moderating the
comments in gadmin/comments.php
2) When adding a comment like "><script>alert(1)</script> , xss will occur
when moderating the comments
3) gallery/tags.php?tag="><script>alert(1)</script>
4) probably more bugs.
Regards,
Thomas Pollet
Content of type "text/html" skipped
Download attachment "911006.php" of type "application/octet-stream" (4751 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists