WPkontakt.txt

2004-12-31T00:00:00
ID PACKETSTORM:35508
Type packetstorm
Reporter Blazej Miga
Modified 2004-12-31T00:00:00

Description

                                        
                                            `  
Product: WPKontakt (<= 3.0.1)  
Vendor: Wirtualna Polska (http://kontakt.wp.pl/index.html)  
Impact: Remote script execution in Internet Zone  
Severity: Medium  
Authors: Blazej Miga <bla@man.poznan.pl>,  
Jaroslaw Sajko <sloik@man.poznan.pl>  
Advisory: http://www.man.poznan.pl/security/wpkontakt.html  
  
  
[ISSUE]  
  
WPkontakt is the another Polish instant messenger. The problem is similiar  
to the problems revealed in GG or Tlen.pl - parsing error leading to the  
remote script execution.  
  
  
[DETAILS]  
  
Parsing error while parsing en email addresses allows us to inject  
javascript code like this:  
  
test@"style="background-image:url(javascript:alert(%22You%20are%20owned!%22>))".wp.pl  
  
The code will execute in Internet Zone.  
  
  
[SOLUTION]  
  
Please upgrade to the newest version (3.0.1p1)  
  
  
  
Coprights Poznan Supercomputing and Networking Center  
  
`