[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] MBT Xss vulnerability



Well I'm not going to talk about how XSS is useless because we all
know it can be quite a serious problem.  I think, and I don't know the
guy so I can't be sure, the original dissenter to this post was
pointing out that:
What would you phish from a site that doesn't have any forms anyways?
What would stealing a session cookie get you if the only dynamic
content is a search function?

I'm not saying XSS isn't important, I'm just wondering why this case is?

-sb

On 1/20/06, Jerome Athias <jerome.athias@xxxxxxx> wrote:
> Hey guy, do you know something about XSS
> 1) Phishing?
> 2) encoded URL, UTF8...?
> 3) cookie steal?
> ...
>
> it'll not be difficult to reproduce a website and have an url difficult
> to understand for a basic user...
> sure it's harder to spoof the url in the browser...
> //
>
> Native.Code a écrit :
> > What a lame vulnerability it is. If your POC redirects to another site
> > (which is not MBT site), how someone will become victim and believe that
> > he/she is doing business with MBT?
> >
> > Your post is yet another proof that FD is more and more inhibited by scipt
> > kiddies. Get a life!
> >
>
>
> ---------------------------------------------------------------------------------------------------------
> About FD:
> "Speech is silver, but silence is gold"
>
>
> /JA
> /https://www.securinfos.info/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/