Full Disclosure mailing list archives
gallarific backdoored , vulnerable to xss
From: "Thomas Pollet" <thomas.pollet () gmail com>
Date: Tue, 15 Apr 2008 18:07:57 +0200
Hello, I was looking at the free version of gallarific, and I found some suspicious code in the scopbin directory. Attached is a file I found in the zip i downloaded, in case someone wants to decode it. the package can be downloaded from http://www.gallarific.com/download.php Also, the software contains several xss flaws: 1) When modifying a user his email address like h () h com"><script>alert(1);</script> persistent xss wil occur when viewing gadmin/users.php or moderating the comments in gadmin/comments.php 2) When adding a comment like "><script>alert(1)</script> , xss will occur when moderating the comments 3) gallery/tags.php?tag="><script>alert(1)</script> 4) probably more bugs. Regards, Thomas Pollet
Attachment:
911006.php
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- gallarific backdoored , vulnerable to xss Thomas Pollet (Apr 15)
- Re: gallarific backdoored , vulnerable to xss Andrew Farmer (Apr 15)