lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <002a01cbb720$d83e7740$c103fea9@ml> Date: Tue, 18 Jan 2011 17:01:47 +0200 From: "MustLive" <mustlive@...security.com.ua> To: <submissions@...ketstormsecurity.org>, <bugtraq@...urityfocus.com>, <full-disclosure@...ts.grok.org.uk> Subject: Fw: Vulnerability in widget Flash Tag Cloud for Blogsa and other ASP.NET engines Hello list! I want to warn you about Cross-Site Scripting vulnerability in b-cumulus. It's widget for Blogger, which is also using at separate sites. SecurityVulns ID: 11353. ------------------------- Affected products: ------------------------- Vulnerable are all versions of b-cumulus. ---------- Details: ---------- This XSS is similar to XSS vulnerability in WP-Cumulus, because it's using modified version of tagcloud.swf made by author of WP-Cumulus. About such vulnerabilities I wrote in 2009-2010, particularly about millions of flash files tagcloud.swf which are vulnerable to XSS attacks I mentioned in my article XSS vulnerabilities in 34 millions flash files (http://www.webappsec.org/lists/websecurity/archive/2010-01/msg00035.html). XSS (WASC-08): It can be used the file tagcloud.swf or tagcloud-ru.swf. http://site/path/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E http://site/path/tagcloud-ru.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E Code will execute after click. It's strictly social XSS. Also it's possible to conduct (like in WP-Cumulus) HTML Injection attack. ------------ Timeline: ------------ 2011.01.17 - disclosed at my site. 2011.01.18 - informed developers. I mentioned about this vulnerability at my site (http://websecurity.com.ua/4849/). Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists