Re: [Full-disclosure] HomestayFinder XSS Vulnerability in Wikipedia Mirror
http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox now redirects to http://www.inglesnoexterior.com/dictionary.aspx?q=User:Susam_pal/Sandbox Vulnerable script moved to another domain. To protect the cookies of homestayfinder.com??? Wondering whether this kinda attack would be called persistent XSS or something else? This is a case where the attack vector goes into one site and the vector exploits another site. How to classify this? On 7/11/07, Susam Pal <[EMAIL PROTECTED]> wrote: > Hi Matjaz, > > I just checked it and I find it to be working with the browsers I have > (tested with Firefox 2.0.0.3 and Internet Explorer 7). > > http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox > demonstrates the vulnerability. > > http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox is the page where > the script is hosted. The script present in Wikipedia exploits the XSS > vulnerability in HomestayFinder's Dictionary.aspx script. > > Regards, > Susam Pal > > Matjaz Debelak writes: > > > Well, it does not appear to work for me in any browser (tested Firefox > > 2.0.0.3 and Konqueror). > > > > LP Killer_X > > > > Susam Pal wrote: > >> There is an XSS vulnerability in HomestayFinder's 'Dictionary.aspx' > >> script which is responsible for mirroring the content of Wikipedia. I > >> found this interesting because here a script injected in one website > >> exploits an XSS vulnerability in another website. > >> > >> I am including only a short example to demonstrate the issue. The > >> complete document is available at:- > >> http://susam.in/security/advisory-2007-07-11.txt > >> > >> http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox consists of the > >> following as the source wiki markup: > >> > >>alert('XSS Demo') > >> > >> http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox > >> consists of the same code as HTML without the special characters encoded > >> as HTML entities. Hence, the script is executed on the browser of the > >> visitor. > >> > >> Contact Information:- > >> Susam Pal > >> [EMAIL PROTECTED] > >> http://susam.in/ > >> > >> > >> ___ > >> Full-Disclosure - We believe in it. > >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html > >> Hosted and sponsored by Secunia - http://secunia.com/ > >> > > > > ___ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] HomestayFinder XSS Vulnerability in Wikipedia Mirror
It works for me. JS enabled in your browser? On 7/11/07, Matjaz Debelak <[EMAIL PROTECTED]> wrote: > Well, it does not appear to work for me in any browser (tested Firefox > 2.0.0.3 and Konqueror). > > LP Killer_X > > Susam Pal wrote: > > There is an XSS vulnerability in HomestayFinder's 'Dictionary.aspx' > > script which is responsible for mirroring the content of Wikipedia. I > > found this interesting because here a script injected in one website > > exploits an XSS vulnerability in another website. > > > > I am including only a short example to demonstrate the issue. The > > complete document is available at:- > > http://susam.in/security/advisory-2007-07-11.txt > > > > http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox consists of the > > following as the source wiki markup: > > > >alert('XSS Demo') > > > > http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox > > consists of the same code as HTML without the special characters encoded > > as HTML entities. Hence, the script is executed on the browser of the > > visitor. > > > > Contact Information:- > > Susam Pal > > [EMAIL PROTECTED] > > http://susam.in/ > > > > > > ___ > > Full-Disclosure - We believe in it. > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > > Hosted and sponsored by Secunia - http://secunia.com/ > > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] HomestayFinder XSS Vulnerability in Wikipedia Mirror
Hi Matjaz, I just checked it and I find it to be working with the browsers I have (tested with Firefox 2.0.0.3 and Internet Explorer 7). http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox demonstrates the vulnerability. http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox is the page where the script is hosted. The script present in Wikipedia exploits the XSS vulnerability in HomestayFinder's Dictionary.aspx script. Regards, Susam Pal Matjaz Debelak writes: > Well, it does not appear to work for me in any browser (tested Firefox > 2.0.0.3 and Konqueror). > > LP Killer_X > > Susam Pal wrote: >> There is an XSS vulnerability in HomestayFinder's 'Dictionary.aspx' >> script which is responsible for mirroring the content of Wikipedia. I >> found this interesting because here a script injected in one website >> exploits an XSS vulnerability in another website. >> >> I am including only a short example to demonstrate the issue. The >> complete document is available at:- >> http://susam.in/security/advisory-2007-07-11.txt >> >> http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox consists of the >> following as the source wiki markup: >> >>alert('XSS Demo') >> >> http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox >> consists of the same code as HTML without the special characters encoded >> as HTML entities. Hence, the script is executed on the browser of the >> visitor. >> >> Contact Information:- >> Susam Pal >> [EMAIL PROTECTED] >> http://susam.in/ >> >> >> ___ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] HomestayFinder XSS Vulnerability in Wikipedia Mirror
Well, it does not appear to work for me in any browser (tested Firefox 2.0.0.3 and Konqueror). LP Killer_X Susam Pal wrote: > There is an XSS vulnerability in HomestayFinder's 'Dictionary.aspx' > script which is responsible for mirroring the content of Wikipedia. I > found this interesting because here a script injected in one website > exploits an XSS vulnerability in another website. > > I am including only a short example to demonstrate the issue. The > complete document is available at:- > http://susam.in/security/advisory-2007-07-11.txt > > http://en.wikipedia.org/wiki/User:Susam_pal/Sandbox consists of the > following as the source wiki markup: > >alert('XSS Demo') > > http://www.homestayfinder.com/Dictionary.aspx?q=User:Susam_pal/Sandbox > consists of the same code as HTML without the special characters encoded > as HTML entities. Hence, the script is executed on the browser of the > visitor. > > Contact Information:- > Susam Pal > [EMAIL PROTECTED] > http://susam.in/ > > > ___ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/