Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  [security bulletin] HPSBMI02614 SSRT100344 rev.1 - HP webOS Contacts Application, Remote Execution of Arbitrary Code

  Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability

  Multiple XSS in Solarwinds Orion NPM 10.1

  www.eVuln.com : HTTP Response Splitting in WWWThreads (php version)

From:Aliaksandr Hartsuyeu <bt_(at)_evuln.com>
Date:12 декабря 2010 г.
Subject:www.eVuln.com : Non-persistent XSS in slickMsg

www.eVuln.com advisory:
Non-persistent XSS in slickMsg
Summary: http://evuln.com/vulns/159/summary.html
Details: http://evuln.com/vulns/159/description.html

-----------Summary-----------
eVuln ID: EV0159
Software: slickMsg
Version: 0.7-alpha
Critical Level: low
Type: Cross Site Scripting
Status: Unpatched. No reply from developer(s)
PoC: Not available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
It is possible to inject xss code into title parameter in
views/Thread/display/top.php script.
Parameter title is not properly sanitized before being used in HTML code.

Condition: register_globals: on
--------PoC/Exploit--------
PoC code is available at:
http://evuln.com/vulns/159/exploit.html
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/auth-bypass/cookie.html - recent cookie authentication bypass
vulnerabilities.

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород