exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Daronet-viewimage.txt

Daronet-viewimage.txt
Posted Nov 3, 2006
Authored by LegendaryZion | Site zion-security.com

Daronet Internet Solutions website platform is prone to a cross site scripting vulnerability in "ViewImage.asp"

tags | advisory, xss, asp
SHA-256 | 0f4e9140d0e34ce46e941fcf9b974a69db2c2942bc788ea0c595a91a049d841a

Daronet-viewimage.txt

Change Mirror Download

·= Security Advisory =·

Issue: Cross Site Scripting (XSS) Vulnerability in "ViewImage.asp" by
Daronet Internet Solutions
Discovered Date: 29/01/2006
Author: Tal Argoni, LegendaryZion. [talargoni at gmail.com]
Product Vendor: http://www.daronet.co.il

Details:

Daronet Internet Solutions website platform is prone to a Cross Site
Scripting Vulnerability.
The vulnerability exists in "ViewImage.asp" file, caused by the lack of
Input Validation/Filtering
of quotation and HTML characters in the GET parameter "Image".
The use of "ViewImage.asp" is done by "Funclib.js".

Contents of Funclib.js:
---------------------------------
...

function fnShowFullImg(sFile) {
window.open("ViewImage.asp?Image="+sFile,"image","top=50,left=50,width="+(screen.availWidth-100)+",height="+(screen.availHeight-100)+",scrollbars");}...After the function is being called, ViewImage.asp prints the following HTMLcode:------------------------------------------------------------------------------------------------------------------...<td style="border: 2px solid #FFFFFF;"><img src="<Unfiltered Input>"style="border: 1px solid #000000;"></td>...Exploitation URL:http://www.example.com/ViewImage.asp?Image=">your xss code hereSuccessful exploitation may allow execution of script code. This could alsobe exploited to spoof the entire website's content,create fake login menu's for all the platform's users, commit Denial OfService attacks and more...Proof Of Concept:http://www.example.com/ViewImage.asp?Image="><script>alert()<script>To view the full list of vulnerable websites:http://www.daronet.co.il/Index.asp?CategoryID=46&SubjectID=&Page=1Even http://www.2bsecure.co.i
l!
....XSS + Phishing + Social =Daronet Internet Solutions provide an Administration System,that help customers to manage there website by log in to vulnerable XSSpage.The attacker has full access to the retrieved web page just as fake loginpage to the administration system,that cause customer may unintentionally login to attacker fake login page,and send the password of the administration system to the attacker.("hackthe website").http://support.daronet.com/usermanual4.0/ViewImage.asp?Image=">Your XSS codeherehttp://support.daronet.com/basic3/ViewImage.asp?Image=">Your XSS code hereThanks,Tal Argoni, CEHwww.zion-security.com

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close