lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 24 Apr 2017 11:47:12 +0200
From: "HTTPCS" <contact@...pcs.com>
To: <fulldisclosure@...lists.org>
Subject: [FD] Flyspray 'real_name' Cross Site Scripting Vulnerability

HTTPCS Advisory : HTTPCS160 

Product : Flyspray 

Version : 1.0-rc4 

Date : 2017-04-24 

Criticality level : Less Critical 

Description : A vulnerability has been discovered in Flyspray , which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'real_name' parameter to '/index.php?do=myprofile' is not
properly sanitised before being returned to the user. This can be exploited
to execute arbitrary HTML and script code in a user's browser session in
context of an affected site. 

Page : /index.php?do=myprofile 

Variables :
csrftoken=1061054859&real_name=[VulnHTTPCS]&email_address=testhttpcs2@...pcs
.com&profile_image=¬ify_type=0&dateformat=%d.%m.%Y&dateformat_extended=%d.%m
.%Y
%H:%M&tasks_perpage=25&time_zone=0&lang_code=en&old_global_id=4&old_group_id
=8&project_id=1&oldpass=&changepass=&confirmpass=&action=myprofile.edituser&
user_id=3 

Type : XSS 

Method : POST 

Solution : The vendor did not propose a solution yet

References :  <https://www.httpcs.com/advisory/httpcs160>
https://www.httpcs.com/advisory/httpcs160 

Credit : CYRIL VALLICARI / HTTPCS / ZIWIT

 


Download attachment "image001.png" of type "image/png" (190 bytes)


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ