Wallpaper script "name"跨站脚本漏洞

2013-12-27T00:00:00
ID SSV:61222
Type seebug
Reporter Root
Modified 2013-12-27T00:00:00

Description

Wallpaper Script是一个图形平台,可以专业管理壁纸。

Wallpaper script 3.5.0082版本上传或编辑壁纸时"name"参数没有被正确过滤,成功利用后可使远程攻击者插入HTML和脚本代码,然后在用户浏览器会话中执行。 0 Wallpaper Script Wallpaper Script 3.5.0082 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.wallpaperscript.com/

                                        
                                            
                                                [~] Exploit Title : Wallpaper Script Stored XSS Vulnerability
[~] D0rk Google : 
[~] Author : nullp0int3r (0x00p0int3r@gmail.com)
[~] Version : 3.5.0082
[~] Date : 2013-12-14
[~] Vendor Homepage: http://www.wallpaperscript.com/
[~] Test on : Windows


Exploitation:
1) Register and log on as a regular member
2) Click on "Add Wallpaper"
3) Write in the title field: </title><script>alert("XSS")</script>
4) Fill other fields and choose a photo and click on "Save"
5) Go to "My Wallpapers"
6) Select your uploaded photo

Thanks:
Enddo
Far3nh3it