[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] Yourls XSS Stored
From:       Alvaro Diaz <alvarodiazher () gmail ! com>
Date:       2014-10-24 22:32:47
Message-ID: CAH1zHQbPFpfe29GpnkcU74_02ha-o326vNWzNXwVYHpYQGyR+g () mail ! gmail ! com
[Download RAW message or body]

Hello, I found a xss stored vulnerability in Yourls 1.7 script (latest
version).

The attacker can steal the admin's cookies and login in the admin panel.

Note: Only the admin can see this.

Steps to perform the vulnerability:

1. Create a new url to shorten --> In the inputs you need write this
payload --> anything"><img src=x onerror=prompt(1)>*

* Javascript code to inject.

2. Click in the button "Shorten"

3. Wait until the administrator logs in the admin panel

Screenshoots:

1.  http://i.imgur.com/G4r6uV0.png

2. http://i.imgur.com/jhGR4n2.png

3. http://i.imgur.com/gQYSqgt.png


Thank You, Kind Regards.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic