[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Full-Disclosure] Re: Openware.org IE Fix - Warning



Not only does it have memory leaks and buffer
overflows, it contains an XSS flaw.

<a
href="http://www.openwares.org/cgi-bin/exploit.cgi?www.example.com</a><script>alert(unescape("This%20is%20cross%20site%20scripted!"))</script>">http://www.openwares.org/cgi-bin/exploit.cgi?www.example.com</a><script>alert(unescape("This%20is%20cross%20site%20scripted!"))</script></a>

Honestly, how can anyone who issues a security patch
have such enormous gaping holes in it. I think even
Microsoft could do better then this one. This takes a
relatively minor bug, and turns it into a wide open
security failure.

Their site does use cookies to track a session ID,
which could lead to a compromise of user accounts when
combined with a javascript XSS.

admin@openwares.org notified.

Aaron Horst


=====
"A bug. Every system has a bug. The more complex the system, the more bugs. 
Transactions circling the earth, passing through the computer systems of tens 
or hundreds of corporate entities, thousands of network switches, millions of 
lines of code, trillions of integrated? circuit logic gates. Somewhere there is 
a fault. Sometime the fault will be activated. Now or next year, sooner or 
later, by design, by hack, or by onslaught of complexity. It doesn?t matter. 
One day someone will install ten new lines of assembler code, and it will all 
come down. " -- Ellen Ullman

__________________________________
Do you Yahoo!?
New Yahoo! Photos - easier uploading and sharing.
http://photos.yahoo.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html