WebApp Sec mailing list archives

Nullsoft ShoutcastServer Persistant XSS - 0day


From: SaMuschie <samuschie () yahoo de>
Date: Tue, 27 Feb 2007 21:42:37 +0100 (CET)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+--------------------------------------- -  -- -
| SaMuschie Research Labs proudly presents . . .
+-------------------------------------------  -- -  -  
| Application: Nullsoft ShoutcastServer
| Version: 1.9.7/Win32 (other versions/platforms not tested)
| Vuln./Exploit Type: Persistant XSS
| Status: -0day
+----------------------------------------- --  -  -  
| Discovered by: Muschiemann
| Released: 20070227
| SaMuschie Release Number: 3
+------------------------------- -  -- -

It is possible to inject scriptcode into the applications logfile without
authentication. Once the admin is viewing the logfile via the web interface, 
the scriptcode will be executed.

e.g.:

http://victim:8001/"/><script>alert(document.getElementsByTagName("PRE")[0].firstChild.data)</script>

By abusing this vuln it is possible to send the complete logfile to an evil host. 

+-----------------------------  -- -
| Lameness Disclaimer
+------------------------------------- - -- -  -  
| SaMuschie Research Labs was found to publish
| vulnerabilities within well known software products,
| which are easy to discover and exploit.
| 
| SaMuschie researchers just spend a minimum of time
| and knowledge for each vulnerability. Hence readers of 
| this advisory are requested not to ask any questions
| to the researchers.... they don't know the answer ;) 
+----------------------------------  - --  - -
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)

iD8DBQFF5H4RCrtcl+ifKZARAsHoAJ9xBhoq8tuX/I5mPU1OjmJbRJSPggCfTNFj
8kqRWw8smOdqvIoKPWTuZuA=
=oALk
-----END PGP SIGNATURE-----




        
                
___________________________________________________________ 
Der frühe Vogel fängt den Wurm. Hier gelangen Sie zum neuen Yahoo! Mail: http://mail.yahoo.de

-------------------------------------------------------------------------
Sponsored by: Watchfire

The Twelve Most Common Application-level Hack Attacks
Hackers continue to add billions to the cost of doing business online 
despite security executives' efforts to prevent malicious attacks. This 
whitepaper identifies the most common methods of attacks that we have seen, 
and outlines a guideline for developing secure web applications. 
Download today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=701500000008fHe
--------------------------------------------------------------------------


Current thread: