what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

pabox20.txt

pabox20.txt
Posted Mar 17, 2005
Authored by Rift

PaBox version 2.0 is susceptible to cross site scripting attacks via a variable that gets user defined and later used in an IMG tag.

tags | exploit, xss
SHA-256 | bb99e378a5bd7a4d9b7e12872dc2af16556ed81e670f86e6f4b5716d85941f76

pabox20.txt

Change Mirror Download


pabox 2.0 no longer includes the Date and Time parameters in the POST data sent with your shout. The date and time parameters in previous versions were vulnerable to a cross site scripting attack. Now however in version 2.0 if you setup paBox to include an icon with your topic... eg:

:winkface: posted By SomePerson on 3/10/05 04:11 PM
<message follows here>


the parameter in the form that lets you select which 'smilie' to use as an icon for your post is prone to a script injection attack. the specific parameter used is:

<INPUT type=radio CHECKED value="wink.gif" name=posticon>

where wink.gif becomse the value of the src attribute of the <img> tag when your post is submitted. by simply altering wink.gif, or adding another instance of this parameter, you can inject your own code into the value of the new parameter. eg:

<INPUT type=radio CHECKED value=""><script>document.write(document.cookie);</script>" name=posticon>click me

simply check the radio button that reads 'click me' then submit your form as normal, and the code will be injected into the shoutbox. Not everyone running version 2.0 of pabox seems to have this feature enabled, however from a quick search id say it's about 70% of the users that do have it enabled. the official demonstration page for paBox 2.0 can be found at the phparena.net website.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close