lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <884860.78106.qm@web24919.mail.ird.yahoo.com>
Date: Wed, 23 Dec 2009 02:16:53 -0800 (PST)
From: Floyd Fuh <floyd_fuh@...oo.de>
To: full-disclosure@...ts.grok.org.uk
Subject: XSS in WebMathematica
Hi list
I tried to follow the RainForest Puppy Policy, but Wolfram
didn't respond to my email within 5 days.
In some installations, the MSP script of webMathematica is vulnerable to
reflected XSS. Just insert a backslash after the script name MSP, which is
normally located under the "webMathematica" folder:
http://www.example.com/webMathematica/MSP\<script>alert('a')</script>
Oh and of course a local path disclosure:
http://www.example.com/webMathematica/MSP
You can find victims with this Google search string:
inurl:"/webMathematica/" -wolfram.com
Most victims are universities and high schools all over the world, from Finland,
Switzerland, Czech Republic, Russia, America and Japan.
Don't forget that a lot of universities are part of Microsoft's MSDN and the students
can download nearly all Microsoft software for free. This could be an interesting exploiting
scenario.
cheers
floyd
PS: I don't need a blog
__________________________________________________
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails.
http://mail.yahoo.com
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists