lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 23 Dec 2009 02:16:53 -0800 (PST)
From: Floyd Fuh <floyd_fuh@...oo.de>
To: full-disclosure@...ts.grok.org.uk
Subject: XSS in WebMathematica

Hi list


I tried to follow the RainForest Puppy Policy, but Wolfram 
didn't respond to my email within 5 days.

In some installations, the MSP script of webMathematica is vulnerable to 
reflected XSS. Just insert a backslash after the script name MSP, which is 
normally located under the "webMathematica" folder:

http://www.example.com/webMathematica/MSP\<script>alert('a')</script>

Oh and of course a local path disclosure:
http://www.example.com/webMathematica/MSP

You can find victims with this Google search string:

inurl:"/webMathematica/" -wolfram.com

Most victims are universities and high schools all over the world, from Finland, 
Switzerland, Czech Republic, Russia, America and Japan.

Don't forget that a lot of universities are part of Microsoft's MSDN and the students
can download nearly all Microsoft software for free. This could be an interesting exploiting
scenario.

cheers
floyd

PS: I don't need a blog


__________________________________________________
Do You Yahoo!?
Sie sind Spam leid? Yahoo! Mail verfügt über einen herausragenden Schutz gegen Massenmails. 
http://mail.yahoo.com 
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ