[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEx3s0Suv3nhMxvKS3GCnL0cgTUw5mDbg5+OaOcBsY=FO7HaDw@mail.gmail.com>
Date: Thu, 13 Jun 2013 11:14:56 +0200
From: samuel alp <samuelalp95@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Yet another (unpaid and unfixed) Paypal XSS
Hi People
Found a XSS on german Paypal website last week and reported it exactly 7
days ago.
Their response was one we very well know
Another researcher already discovered the bug.
So, someone else found the Vulnerability before me and reported it.
Fine, looks like I was too slow. I can live with that.
Now, i received an answer exactly 7 Days ago. That means they had more than
a week to fix this
https://www.paypal.de/Einkaufswelt/H%C3%A4ndlerverzeichnis/?c=" ||
alert('XSS') || "
All they'd have to do is escape quotation marks or remove them since
they're not used anyways.
The Approximate time that takes is ~15 Seconds.
I am amazed by how long it takes some huge companys to close holes in their
websites
______________________________________________________
Samuel Alp
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists