mp3com.txt

2006-06-26T00:00:00
ID PACKETSTORM:47654
Type packetstorm
Reporter David "Aesthetico" Vieira-Kurz
Modified 2006-06-26T00:00:00

Description

                                        
                                            `mp3.com - Cross site scripting vulnerability  
----------------------------------------------  
Type: Cross site scripting  
  
Date: June, 15th 2006  
----------------------------------------------  
  
Credits:  
----------------------------------------------  
Discovered by: David "Aesthetico" Vieira-Kurz  
http://www.majorsecurity.de  
----------------------------------------------  
  
Vulnerability:  
----------------------------------------------  
I found a bug on MP3.com("http://mp3.com").  
  
Input passed to the "query" parameter in "search.php" is not properly sanitised before being returned to the user.   
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.  
  
Sending a malicious code will result a code working on the page that pops up...  
  
http://mp3.com/search.php?action=Search&stype=[categorie]&query=[XSS CODE HERE]&x=0&y=0  
  
  
Examples:  
----------------------------------------------  
/search.php?action=Search&stype=artist&query=<script>alert("MajorSecurity")</script>&x=0&y=0  
`