View Single Post
Old 02-19-2013, 09:10 AM  
Colmike9
(>^_^)b
 
Colmike9's Avatar
 
Industry Role:
Join Date: Dec 2011
Posts: 7,223
Code:
Description:
------------
ICQ suffers from a persistent Cross-Site Scripting vulnerability due to a lack
of input validation and output sanitization of the profile entries.
 
Proof of Concept:
-----------------
The following Javascript payload can be used as profile entries to trigger
the described vulnerability:
 
--- SNIP ---
 
"><iframe src=z onload=alert('xss_p0wer_lol') <
 
--- SNIP ---
 
For a PoC demonstration see:
    - http://www.noptrix.net/tmp/icq_cli_xss.png
 
Impact:
-------
An attacker could trivially hijack session IDs of remote users and leverage the
vulnerability to increase the attack vector to the underlying software and
operating system of the victim.
 
Threat Level:
-------------
High
__________________
Join the BEST cam affiliate program on the internet!
I've referred over $1.7mil in spending this past year, you should join in.
I make a lot more money in the medical field in a lab now, fuck you guys. Don't ask me to come back, but do join Chaturbate in my sig, it still makes bank without me touching shit for years..
Colmike9 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote