[prev in list] [next in list] [prev in thread] [next in thread]
List: full-disclosure
Subject: [Full-disclosure] =?utf-8?b?W0hUVFBDU10gMiBWdWxuZXJhYuKAi2lsaXRp?= =?utf-8?q?es_in_OurWebFTP?=
From: HTTPCS <contact () httpcs ! com>
Date: 2012-11-30 16:54:01
Message-ID: 981590487.279176.1354294441327.JavaMail.open-xchange () email ! 1and1 ! fr
[Download RAW message or body]
------=_Part_279175_1519741142.1354294441245
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
HTTPCS Advisory : HTTPCS112
Product : OurWebFTP
Version : 5.3.5
Page : /index.php
Variables : mwb_control2=Enter&mwa_control2=op:login&ftp_host=[VulnHTTPCS]
Type : XSS
Method : POST
Description : A vulnerability has been discovered in OurWebFTP, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'ftp_host' parameter to '/index.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.
References : https://www.httpcs.com/advisory/httpcs112
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
HTTPCS Advisory : HTTPCS113
Product : OurWebFTP
Version : 5.3.5
Page : /index.php
Variables :
mwb_control2=Enter&mwa_control2=op:login&ftp_host=localhost&ftp_user=[VulnHTTPCS]
Type : XSS
Method : POST
Description : A vulnerability has been discovered in OurWebFTP, which can be
exploited by malicious people to conduct cross-site scripting attacks. Input
passed via the 'ftp_user' parameter to '/index.php' is not properly sanitised
before being returned to the user. This can be exploited to execute arbitrary
HTML and script code in a user's browser session in context of an affected site.
References : https://www.httpcs.com/advisory/httpcs113
Credit : HTTPCS [Web Vulnerability Scanner]
_______________________________________________
https://www.httpcs.com/advisories
_______________________________________________
Twitter : http://twitter.com/HTTPCS_
Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
------=_Part_279175_1519741142.1354294441245
MIME-Version: 1.0
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: 7bit
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" \
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html \
xmlns="http://www.w3.org/1999/xhtml"><head> <meta content="text/html; charset=UTF-8" \
http-equiv="Content-Type"/> </head><body style="">
<div>
HTTPCS Advisory : HTTPCS112
<br/>
<br/>Product : OurWebFTP
<br/>
<br/>Version : 5.3.5
<br/>
<br/>Page : /index.php
<br/>
<br/>Variables : mwb_control2=Enter&mwa_control2=op:login&ftp_host=[VulnHTTPCS]
<br/>
<br/>Type : XSS
<br/>
<br/>Method : POST
<br/>
<br/>Description : A vulnerability has been discovered in OurWebFTP, which can be exploited \
by malicious people to conduct cross-site scripting attacks. Input passed via the \
'ftp_host' parameter to '/index.php' is not properly sanitised before being \
returned to the user. This can be exploited to execute arbitrary HTML and script code in a \
user's browser session in context of an affected site. <br/>
<br/>References : https://www.httpcs.com/advisory/httpcs112
<br/>
<br/>Credit : HTTPCS [Web Vulnerability Scanner]
</div>
<div>
_______________________________________________
</div>
<div>
 
</div>
<div>
HTTPCS Advisory : HTTPCS113
<br/>
<br/>Product : OurWebFTP
<br/>
<br/>Version : 5.3.5
<br/>
<br/>Page : /index.php
<br/>
<br/>Variables : mwb_control2=Enter&mwa_control2=op:login&ftp_host=localhost&ftp_user=[VulnHTTPCS]
<br/>
<br/>Type : XSS
<br/>
<br/>Method : POST
<br/>
<br/>Description : A vulnerability has been discovered in OurWebFTP, which can be exploited \
by malicious people to conduct cross-site scripting attacks. Input passed via the \
'ftp_user' parameter to '/index.php' is not properly sanitised before being \
returned to the user. This can be exploited to execute arbitrary HTML and script code in a \
user's browser session in context of an affected site. <br/>
<br/>References : https://www.httpcs.com/advisory/httpcs113
<br/>
<br/>Credit : HTTPCS [Web Vulnerability Scanner]
</div>
<div>
<div>
_______________________________________________
</div>
<div>
https://www.httpcs.com/advisories
</div>
<div>
_______________________________________________
</div>
<div>
<br/>Twitter : http://twitter.com/HTTPCS_
<br/>Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
</div>
</div>
</body></html>
------=_Part_279175_1519741142.1354294441245--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic