Lucene search

K
packetstormBlazej MigaPACKETSTORM:35508
HistoryDec 31, 2004 - 12:00 a.m.

WPkontakt.txt

2004-12-3100:00:00
Blazej Miga
packetstormsecurity.com
16
`  
Product: WPKontakt (<= 3.0.1)  
Vendor: Wirtualna Polska (http://kontakt.wp.pl/index.html)  
Impact: Remote script execution in Internet Zone  
Severity: Medium  
Authors: Blazej Miga <[email protected]>,  
Jaroslaw Sajko <[email protected]>  
Advisory: http://www.man.poznan.pl/security/wpkontakt.html  
  
  
[ISSUE]  
  
WPkontakt is the another Polish instant messenger. The problem is similiar  
to the problems revealed in GG or Tlen.pl - parsing error leading to the  
remote script execution.  
  
  
[DETAILS]  
  
Parsing error while parsing en email addresses allows us to inject  
javascript code like this:  
  
test@"style="background-image:url(javascript:alert(%22You%20are%20owned!%22>))".wp.pl  
  
The code will execute in Internet Zone.  
  
  
[SOLUTION]  
  
Please upgrade to the newest version (3.0.1p1)  
  
  
  
Coprights Poznan Supercomputing and Networking Center  
  
`