Re: [Full-disclosure] XSS in Oracle default fcgi-bin/echo

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Paul,

The mere mention of fcgi-bin/echo in your first mail is enough for
anybody to derive the PoC. Here's what I found in under a minute:
/fcgi-bin/echo/<script>aler('xss')</script>

Anybody with a days work in Web Application security would be able to
figure this out knowing the vulnerable script.

Just my two cents.

Regards,
Riyaz Walikar


On 10/14/10, paul.szabo@xxxxxxxxxxxxx <paul.szabo@xxxxxxxxxxxxx> wrote:
> Dear Thor,
>
> Amazing how people claim being logical ... sure sign they aren't!
>
>> ... Irrespective of the method you choose to validate "bona-fide"
>> recipients of your PoC, you will have no control over what the
>> recipient chooses to do with it once they have it.  As such, logic
>> dictates that your PoC be considered "public" the moment you release
>> it. ...
>
> Does logic dictate that all people are rabid pro-disclosure zealots,
> who do not respect copyright, IP rights, nor gentle personal requests
> for discretion?
>
>> ... don't fool yourself into thinking you are somehow being
>> responsible ...
>
> I do not own an over-inflated ego.
>
>> ... or simply send the code to Oracle and ask them ...
>
> Sorry to blow your assumption: sent to Oracle, ages ago, first thing.
>
> Cheers, Paul
>
> Paul Szabo   psz@xxxxxxxxxxxxxxxxx   http://www.maths.usyd.edu.au/u/psz/
> School of Mathematics and Statistics   University of Sydney    Australia
>


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux