Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:24986
HistoryOct 24, 2010 - 12:00 a.m.

Aardvark Topsite XSS vulnerability

2010-10-2400:00:00
vulners.com
176

Hi,

I found XSS on Aardvark Topsites PHP system.
Dork: "Powered by Aardvark Topsites" "SQL Queries"
XSS:
site_path/index.php?a=search&q=%22%20onmouseover%3dalert(String.fromCharCode(88,83,83))%20par%3d%22
Can use POST to effect the "email", "title", "u" and "url" parameters
either on the same way.
Tested versions: 5.2.0 & 5.2.1 (might work on other versions also).

Haven't found a way to contact the admins/security department directly.
If more details are needed, please contact me.

Thank you,