]> git.vanrenterghem.biz Git - git.ikiwiki.info.git/commitdiff
rename bugs/XSS_Alert...__33____33____33__.html to bugs/XSS_Alert...__33____33____33_...
authorhttp://smcv.pseudorandom.co.uk/ <smcv@web>
Mon, 30 Mar 2015 10:55:39 +0000 (06:55 -0400)
committeradmin <admin@branchable.com>
Mon, 30 Mar 2015 10:55:39 +0000 (06:55 -0400)
doc/bugs/XSS_Alert...__33____33____33__.html [deleted file]
doc/bugs/XSS_Alert...__33____33____33__.mdwn [new file with mode: 0644]

diff --git a/doc/bugs/XSS_Alert...__33____33____33__.html b/doc/bugs/XSS_Alert...__33____33____33__.html
deleted file mode 100644 (file)
index 436e3fa..0000000
+++ /dev/null
@@ -1,29 +0,0 @@
-Respected Sir,
-Your website "webconverger.org" is vulnerable to XSS Attack.
-
-Vulnerable Links:
-webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
-
-How To Reproduce The Vulnerability :
-1. Go to this link : webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
-2. refresh the page and intercept the http request using "brup suite" then at parameter "openid_identifier=" put xss payload
-3. forward the request
-
-XSS Payload :
-1. "></script><script>prompt(909043)</script>
-2. "></script><script>prompt("XSS Alert...!!! : Hacked By Raghav Bisht")</script>
-3. "></script><script>prompt(document.cookie)</script>
-
-NOTE : Proof of concept is attached.
-
-
-Thank You...!!
-
-
-Your Faithfully,
-Raghav Bisht
-raghav007bisht@gmail.com
-
-> Thanks Raghav for reporting this issue. I've fixed it in ikiwiki.
-> 
-> --[[Joey]] 
diff --git a/doc/bugs/XSS_Alert...__33____33____33__.mdwn b/doc/bugs/XSS_Alert...__33____33____33__.mdwn
new file mode 100644 (file)
index 0000000..436e3fa
--- /dev/null
@@ -0,0 +1,29 @@
+Respected Sir,
+Your website "webconverger.org" is vulnerable to XSS Attack.
+
+Vulnerable Links:
+webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
+
+How To Reproduce The Vulnerability :
+1. Go to this link : webconverger.org/ikiwiki.cgi?action=verify&do=signin&openid_identifier=1
+2. refresh the page and intercept the http request using "brup suite" then at parameter "openid_identifier=" put xss payload
+3. forward the request
+
+XSS Payload :
+1. "></script><script>prompt(909043)</script>
+2. "></script><script>prompt("XSS Alert...!!! : Hacked By Raghav Bisht")</script>
+3. "></script><script>prompt(document.cookie)</script>
+
+NOTE : Proof of concept is attached.
+
+
+Thank You...!!
+
+
+Your Faithfully,
+Raghav Bisht
+raghav007bisht@gmail.com
+
+> Thanks Raghav for reporting this issue. I've fixed it in ikiwiki.
+> 
+> --[[Joey]]