Netlog Social - Persistent Cross Site Scripting Vulnerability

2011-12-24T00:00:00
ID VULNERLAB:345
Type vulnerlab
Reporter Vulnerability Research Laboratory - Chokri B.A. (Me!ster)
Modified 2011-12-24T00:00:00

Description

                                        
                                            Document Title:
===============
Netlog Social - Persistent Cross Site Scripting Vulnerability


References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=345


Release Date:
=============
2011-12-24


Vulnerability Laboratory ID (VL-ID):
====================================
345


Product & Service Introduction:
===============================
Netlog is an online community for more than 92 million people in Europe. Netlog (formerly known as Facebox and Bingbox) is 
a Belgian social networking website specifically targeted at the European youth demographic.
The site was founded in July 2003 in Ghent, Belgium, by Lorenz Bogaert and Toon Coppens, and by 2007 had
attracted 28 million members. The site now claims to have over 84 million registered users across 25 languages
On Netlog, members can create their own web page, extend their social network, publish their music playlists,
share videos, post blogs and join groups.

(Copy of the Vendor Homepage: http://en.wikipedia.org/wiki/Netlog)


Abstract Advisory Information:
==============================
The Vulnerability-Lab Team discovered a persistant cross site scripting vulnerability on the Netlog website.


Vulnerability Disclosure Timeline:
==================================
2011-11-26:	Vendor Notification
2011-12-24:	Public or Non-Public Disclosure


Discovery Status:
=================
Published


Exploitation Technique:
=======================
Remote


Severity Level:
===============
High


Technical Details & Description:
================================
A persistent cross site scripting vulnerability is detected on the Netlog website. The vulnerability allows remote
attackers to hijack users sessions via cross site scripting. Successful exploitation of the client-side vulnerability 
can result in session hijacking & account steal.


Vulnerable Module(s):
				                        [+] Pictures

Affected Module(s):
							[+] Netlog.com

Picture(s):
			                              	../netlog.png


Proof of Concept (PoC):
=======================
The vulnerabilities can be exploited by remote attackers on client-side without user inter action. 
For demonstration or reproduce ...

PoC:
">_<"><script>alert("Netlog.com XSS - Meister");</script>

Code Review:
<div class="photoNoteText"> <div class="photoNoteFriend clearfix"> </div> 
"><script>alert("Netlog XSS - Meister");</script> 			<= [x]
</div> </div> <form class="photoNoteForm"> 

Reference(s): 
http://fr.netlog.com/MeisterTheOutlaw/photo/photoid=61667388#photos


Security Risk:
==============
The security risk of the persistent cross site scripting vulnerability is estimated as high(-).


Credits & Authors:
==================
Vulnerability Research Laboratory -  Chokri B.A. (Me!ster)


Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, 
either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-
Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business 
profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some 
states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation 
may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases 
or trade with fraud/stolen material.

Domains:    www.vulnerability-lab.com   	- www.vuln-lab.com			       - www.vulnerability-lab.com/register
Contact:    admin@vulnerability-lab.com 	- support@vulnerability-lab.com 	       - research@vulnerability-lab.com
Section:    video.vulnerability-lab.com 	- forum.vulnerability-lab.com 		       - news.vulnerability-lab.com
Social:	    twitter.com/#!/vuln_lab 		- facebook.com/VulnerabilityLab 	       - youtube.com/user/vulnerability0lab
Feeds:	    vulnerability-lab.com/rss/rss.php	- vulnerability-lab.com/rss/rss_upcoming.php   - vulnerability-lab.com/rss/rss_news.php

Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. 
Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other 
media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and 
other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), 
modify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.

    				   	Copyright © 2012 | Vulnerability Laboratory