[Full-Disclosure] XSS in "Spyware installs with no interaction in IE on fully patchedXP SP2 box"
From: jamie fisher (contact_jamie_fisher_at_yahoo.co.uk)
To: firstname.lastname@example.org Date: Mon, 4 Oct 2004 20:37:13 +0100 (BST)
Above is a measly example of XSS - upload any file you like if you want to the site with XSS; seems to be open to all sorts - but I just spidered the web app and there appears to be quite a number of scripts that are pushing the applications down your wire... Not 100% sure but I'd guess that since this is seems to be the sort of site people would visit to get their windows wares it stands to reason that someone would upload a file like in the example above in order to do... I haven't had the opportunity to see where the .cab is being pushed from - whether on site or off. Would it be worth investigating?
Willem Koenings <email@example.com> wrote:
> > I was unable to verify it, since I don't use IE, and would prefer not
> > infecting myself on accident, however I did run across this:
> > http://themexp.org/about_wrap.php
> > Perhaps one of the themes you downloaded was bundled with the spyware?
> two tiny links from there:
btw, old trusty IE 5.01 + manually configured security settings =
no problem at all. either XP+SP2 broke seriously something in IE
or Geraldo Rivera has just poorly configured internet setting.
-- ___________________________________________________________ Sign-up for Ads Free at Mail.com http://promo.mail.com/adsfreejump.htm _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html --------------------------------- ALL-NEW Yahoo! Messenger - all new features - even more fun! _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html