http://www.csice.org/ Suffers from XSS and CSRF cross site scripting and cross site request forgery attacks. The vulnerability lies in the Post comment filelds in the following page move to this page 'only for authenticated user' http://www.csice.org/student/subjects.html and choose a subject and http://www.csice.org/student/LessonPosting/59/0/view_units.html here users are allowed to post comments there,but the comments r not filtered possibly allowing any one to inject scripts too like we could update a post with a comment like which ill get updated on the DATABASE and the next time when some one views the page tht page ill alert with javascript alert statnment. This attack could be taken to another extend,now tht we could run javascripts on client side we may build a java script, which when runs ill change the user password to a new value, all we have to do is update the code in the comment field and when some other user views the page the script for change password ill get executed and ,his or her password ill be changed. Consider for example : post comment with this wht sas.js do is change the user password to 'hacked' when run on the victim, var pass_req = createAjaxObject(); var data = 'hacked'; alert(data); pass_req.open("post","http://www.csice.org/student/ajax_redirect.php?page=student&option=change_password"); pass_req.setRequestHeader("Content-Type","application/x-www-form-urlencoded"); pass_req.send("data="+data); So using this hack we could hack change any users/administrtors password to a new value I am not able to figure out what CMS this site runs on, but it surel is an open source CMS, see the inurl:ajax_redirect.php?page= you could see a lot of results Filtering the input Will be the way to prevent these issues, have a look at our website and this paper on how to prevent such attacks http://www.whitec0de.com/paper/0121 love FB1H2S hcking is matter of time knowldge and patience