lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAH1zHQbPFpfe29GpnkcU74_02ha-o326vNWzNXwVYHpYQGyR+g@mail.gmail.com>
Date: Sat, 25 Oct 2014 00:32:47 +0200
From: Alvaro Diaz <alvarodiazher@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Yourls XSS Stored

Hello, I found a xss stored vulnerability in Yourls 1.7 script (latest
version).

The attacker can steal the admin's cookies and login in the admin panel.

Note: Only the admin can see this.

Steps to perform the vulnerability:

1. Create a new url to shorten --> In the inputs you need write this
payload --> anything"><img src=x onerror=prompt(1)>*

* Javascript code to inject.

2. Click in the button "Shorten"

3. Wait until the administrator logs in the admin panel

Screenshoots:

1.  http://i.imgur.com/G4r6uV0.png

2. http://i.imgur.com/jhGR4n2.png

3. http://i.imgur.com/gQYSqgt.png


Thank You, Kind Regards.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ