[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] =?utf-8?b?W0hUVFBDU10gMiBWdWxuZXJhYuKAi2lsaXRp?= =?utf-8?q?es_in_OurWebFTP?=
From:       HTTPCS <contact () httpcs ! com>
Date:       2012-11-30 16:54:01
Message-ID: 981590487.279176.1354294441327.JavaMail.open-xchange () email ! 1and1 ! fr
[Download RAW message or body]

------=_Part_279175_1519741142.1354294441245
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

HTTPCS Advisory : HTTPCS112

Product : OurWebFTP

Version : 5.3.5

Page : /index.php

Variables : mwb_control2=Enter&mwa_control2=op:login&ftp_host=[VulnHTTPCS]

Type : XSS

Method : POST

Description : A vulnerability has been discovered in OurWebFTP, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'ftp_host' parameter to '/index.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.

References : https://www.httpcs.com/advisory/httpcs112

Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________

HTTPCS Advisory : HTTPCS113

Product : OurWebFTP

Version : 5.3.5

Page : /index.php

Variables :
mwb_control2=Enter&mwa_control2=op:login&ftp_host=localhost&ftp_user=[VulnHTTPCS]

Type : XSS

Method : POST

Description : A vulnerability has been discovered in OurWebFTP, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'ftp_user' parameter to '/index.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.

References : https://www.httpcs.com/advisory/httpcs113

Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
https://www.httpcs.com/advisories
_______________________________________________

Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
------=_Part_279175_1519741142.1354294441245
MIME-Version: 1.0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" \
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html \
xmlns="http://www.w3.org/1999/xhtml"><head>  <meta content="text/html; charset=UTF-8" \
http-equiv="Content-Type"/>  </head><body style="">
 
 
  <div>
   HTTPCS Advisory : HTTPCS112
   <br/>
   <br/>Product : OurWebFTP
   <br/>
   <br/>Version : 5.3.5
   <br/>
   <br/>Page : /index.php
   <br/>
   <br/>Variables : mwb_control2=Enter&#38;mwa_control2=op:login&#38;ftp_host=[VulnHTTPCS]
   <br/>
   <br/>Type : XSS
   <br/>
   <br/>Method : POST
   <br/>
   <br/>Description : A vulnerability has been discovered in OurWebFTP, which can be exploited \
by malicious people to conduct cross-site scripting attacks. Input passed via the \
&#39;ftp_host&#39; parameter to &#39;/index.php&#39; is not properly sanitised before being \
returned to the user. This can be exploited to execute arbitrary HTML and script code in a \
user&#39;s browser session in context of an affected site.  <br/>
   <br/>References : https://www.httpcs.com/advisory/httpcs112
   <br/>
   <br/>Credit : HTTPCS [Web Vulnerability Scanner]
  </div> 
  <div>
   _______________________________________________
  </div> 
  <div>
   &#160;
  </div> 
  <div>
   HTTPCS Advisory : HTTPCS113
   <br/>
   <br/>Product : OurWebFTP
   <br/>
   <br/>Version : 5.3.5
   <br/>
   <br/>Page : /index.php
   <br/>
   <br/>Variables : mwb_control2=Enter&#38;mwa_control2=op:login&#38;ftp_host=localhost&#38;ftp_user=[VulnHTTPCS]
  <br/>
   <br/>Type : XSS
   <br/>
   <br/>Method : POST
   <br/>
   <br/>Description : A vulnerability has been discovered in OurWebFTP, which can be exploited \
by malicious people to conduct cross-site scripting attacks. Input passed via the \
&#39;ftp_user&#39; parameter to &#39;/index.php&#39; is not properly sanitised before being \
returned to the user. This can be exploited to execute arbitrary HTML and script code in a \
user&#39;s browser session in context of an affected site.  <br/>
   <br/>References : https://www.httpcs.com/advisory/httpcs113
   <br/>
   <br/>Credit : HTTPCS [Web Vulnerability Scanner]
  </div> 
  <div> 
   <div>
    _______________________________________________
   </div> 
   <div>
    https://www.httpcs.com/advisories
   </div> 
   <div>
    _______________________________________________
   </div> 
   <div>
    <br/>Twitter : http://twitter.com/HTTPCS_ 
    <br/>Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
   </div> 
  </div>
 
</body></html>
------=_Part_279175_1519741142.1354294441245--



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic