https://www.cacert.org/wot.php?id=9 multiple POST[subject] and POST[message] XSS
This is part of a code audit on cacert sources. Francesco 'ascii' Ongaro - www.ush.it
HTML POC 1
>>> POST XSS and external source load POC <<<
HTML POC 2
>>> POST XSS and external source load POC <<<
Fast check
curl -ki "https://www.cacert.org/wot.php?id=9&userid=1" -H "Cookie: cacert=2d57e030c022c7b9b152127c482bb01e" -d "subject=AD&message=AD" | grep "AD"
|
|
Vulnerable code
./pages/wot/9.php
|
|
Summary
- POST XSS
- magic quotes gpc ON
- affected by user role (only logged in)
- you need to know a user id (1 is okay :P)