Wiki Spot Cross Site Scripting

2012.02.19
Credit: Sony
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: Wiki Spot Cross Site Scripting # Date: 18.02.2012 # Author: Sony # Software Link: http://wikispot.org/ # Web Browser : Mozilla Firefox # Blog : http://st2tea.blogspot.com # PoC: http://st2tea.blogspot.com/2012/02/wiki-spot-cross-site-scripting.html .................................................................. Simple. 1. https://wikispot.org/User_Settings Put our xss code in the Email address: (recover password) and press button "mail me my account data". http://4.bp.blogspot.com/-0N6459pmLb0/Tz9pircEjeI/AAAAAAAAAhE/kWG0j4cpgcE/s1600/forgot1.JPG http://1.bp.blogspot.com/-_VUY3Fog2Hg/Tz9pnuKFTbI/AAAAAAAAAhQ/ZL4GKnlAW68/s1600/forgot2.JPG 2. https://wikispot.org/User_Settings General Settings-->Personal CSS URL-->put our xss code and press button "save". http://3.bp.blogspot.com/-kzzXofMVwp0/Tz9p5JjRzCI/AAAAAAAAAhc/D-n9oM9IdFM/s1600/settings1.JPG http://4.bp.blogspot.com/-slkwdTyX28A/Tz9p8RRlP_I/AAAAAAAAAho/zqJ6_xhx410/s1600/settings2.JPG .................................................................. InSecurity.Ro Because we care, we're security aware!

References:

http://wikispot.org/
http://st2tea.blogspot.com/2012/02/wiki-spot-cross-site-scripting.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top