{"sourceData": "Document Title:\r\n===============\r\nNetlog Social - Persistent Cross Site Scripting Vulnerability\r\n\r\n\r\nReferences (Source):\r\n====================\r\nhttp://www.vulnerability-lab.com/get_content.php?id=345\r\n\r\n\r\nRelease Date:\r\n=============\r\n2011-12-24\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n345\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nNetlog is an online community for more than 92 million people in Europe. Netlog (formerly known as Facebox and Bingbox) is \r\na Belgian social networking website specifically targeted at the European youth demographic.\r\nThe site was founded in July 2003 in Ghent, Belgium, by Lorenz Bogaert and Toon Coppens, and by 2007 had\r\nattracted 28 million members. The site now claims to have over 84 million registered users across 25 languages\r\nOn Netlog, members can create their own web page, extend their social network, publish their music playlists,\r\nshare videos, post blogs and join groups.\r\n\r\n(Copy of the Vendor Homepage: http://en.wikipedia.org/wiki/Netlog)\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nThe Vulnerability-Lab Team discovered a persistant cross site scripting vulnerability on the Netlog website.\r\n\r\n\r\nVulnerability Disclosure Timeline:\r\n==================================\r\n2011-11-26:\tVendor Notification\r\n2011-12-24:\tPublic or Non-Public Disclosure\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nExploitation Technique:\r\n=======================\r\nRemote\r\n\r\n\r\nSeverity Level:\r\n===============\r\nHigh\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nA persistent cross site scripting vulnerability is detected on the Netlog website. The vulnerability allows remote\r\nattackers to hijack users sessions via cross site scripting. Successful exploitation of the client-side vulnerability \r\ncan result in session hijacking & account steal.\r\n\r\n\r\nVulnerable Module(s):\r\n\t\t\t\t [+] Pictures\r\n\r\nAffected Module(s):\r\n\t\t\t\t\t\t\t[+] Netlog.com\r\n\r\nPicture(s):\r\n\t\t\t \t../netlog.png\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\nThe vulnerabilities can be exploited by remote attackers on client-side without user inter action. \r\nFor demonstration or reproduce ...\r\n\r\nPoC:\r\n\">_<\"><script>alert(\"Netlog.com XSS - Meister\");</script>\r\n\r\nCode Review:\r\n<div class=\"photoNoteText\"> <div class=\"photoNoteFriend clearfix\"> </div> \r\n\"><script>alert(\"Netlog XSS - Meister\");</script> \t\t\t<= [x]\r\n</div> </div> <form class=\"photoNoteForm\"> \r\n\r\nReference(s): \r\nhttp://fr.netlog.com/MeisterTheOutlaw/photo/photoid=61667388#photos\r\n\r\n\r\nSecurity Risk:\r\n==============\r\nThe security risk of the persistent cross site scripting vulnerability is estimated as high(-).\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nVulnerability Research Laboratory - Chokri B.A. (Me!ster)\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, \r\neither expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-\r\nLab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business \r\nprofits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some \r\nstates do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation \r\nmay not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases \r\nor trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t - www.vulnerability-lab.com/register\r\nContact: admin@vulnerability-lab.com \t- support@vulnerability-lab.com \t - research@vulnerability-lab.com\r\nSection: video.vulnerability-lab.com \t- forum.vulnerability-lab.com \t\t - news.vulnerability-lab.com\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t - youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. \r\nPermission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other \r\nmedia, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and \r\nother information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), \r\nmodify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.\r\n\r\n \t\t\t\t \tCopyright \u00a9 2012 | Vulnerability Laboratory\r\n\r\n\r\n\r\n", "description": "", "reporter": "Vulnerability Research Laboratory - Chokri B.A. (Me!ster)", "href": "http://www.vulnerability-lab.com/get_content.php?id=345", "type": "vulnerlab", "viewCount": 6, "references": [], "lastseen": "2018-03-01T19:13:57", "published": "2011-12-24T00:00:00", "cvelist": [], "id": "VULNERLAB:345", "modified": "2011-12-24T00:00:00", "title": "Netlog Social - Persistent Cross Site Scripting Vulnerability", "edition": 1, "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": -0.4, "vector": "NONE", "modified": "2018-03-01T19:13:57", "rev": 2}, "dependencies": {"references": [], "modified": "2018-03-01T19:13:57", "rev": 2}, "vulnersScore": -0.4}}