lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 21 Apr 2012 05:05:31 +0200
From: klondike <>
Subject: XSS parameter injection in the search field of

Yesterday I discovered a funny XSS injection in the website which is an affiliate site of the popular

Despite my efforts at contacting with the site owner I received silence
as answer, I suppose because he though this was either not serious or he
just wanted to ignore me. Thus after the having sent various warnings of
Full Disclosure I have decided to publish the whole thing.

The vulnerability:
The vulnerability is quite simple, the contents of the search string are
pasted escaping characters like ' " and \ inside the value field of the
input thus you can insert which ever attributes you want which allows
for event based injection as long as you don't use the characters ' " or
\ since they will be escaped with an extra \.

Take into account that even if they tried to detect dangerous strings
this would be bypasable by adding <> since those are removed by the
content manager.

The demo (the site is NSFW so be careful):
1. Go to:
(You may need to copy and paste the whole link).
2.Put the mouse over the search bar on the top left.
3. Enjoy! (The text is in Spanish and basically offer links to free porn
and photos of chonis: a social group in Spain).


Download attachment "signature.asc" of type "application/pgp-signature" (263 bytes)

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists