From 7da5085589208573b16afd8a9516cffede43e18c Mon Sep 17 00:00:00 2001 From: "http://smcv.pseudorandom.co.uk/" Date: Mon, 30 Mar 2015 06:56:25 -0400 Subject: fix formatting --- doc/bugs/XSS_Alert...__33____33____33__.mdwn | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) (limited to 'doc/bugs/XSS_Alert...__33____33____33__.mdwn') diff --git a/doc/bugs/XSS_Alert...__33____33____33__.mdwn b/doc/bugs/XSS_Alert...__33____33____33__.mdwn index 436e3faae..2c147073a 100644 --- a/doc/bugs/XSS_Alert...__33____33____33__.mdwn +++ b/doc/bugs/XSS_Alert...__33____33____33__.mdwn @@ -5,14 +5,16 @@ Vulnerable Links: webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1 How To Reproduce The Vulnerability : + 1. Go to this link : webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1 2. refresh the page and intercept the http request using "brup suite" then at parameter "openid_identifier=" put xss payload 3. forward the request XSS Payload : -1. "> -2. "> -3. "> + +1. `">` +2. `">` +3. `">` NOTE : Proof of concept is attached. -- cgit v1.2.3