Penetration Testing mailing list archives
Odd XSS Exploit
From: guinness.stout () gmail com
Date: 1 May 2008 02:29:08 -0000
I was hoping someone could shed some light on this odd XSS vulnerability I uncovered while doing a pentest for a client. The site is a customer portal and when the below XSS is executed nothing happens. Basically gives a session error back, nothing interesting there. But when you kill -9 or End Process on FireFox then reopen with "Restore Session" the site comes back up to the XSS but dumps logged in users information. I cannot replicate this in other browsers nor with Paros, webscarab, SPIKE etc. https://host/portal/j_acegi_security_check?j_username=%27%3Cscript%3Ealert%28%27xss%27%29%3C%2Fscript%3E&j_password=d&login=Login -Chris ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- Odd XSS Exploit guinness . stout (May 01)
- Re: Odd XSS Exploit arvind doraiswamy (May 05)
- Re: Odd XSS Exploit kevin horvath (May 06)
- Re: Odd XSS Exploit arvind doraiswamy (May 05)