Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

Sockso 1.51 Xss

Cross site scripting (xss) is the one of the more common web application vulnerabilities. It allows an attacker to inject malicious javascript into a web application and steal users sessions or cookies. Various other malicious things can also be done. The Xss vunerability in this application leads to the stealing of an administrators session. Xss attacks can be found in up to 80% of web applications or sites.

Sockso is a free and open source music host server (). It is very easy to install and can be setup in minutes. A few of my friends have been using this software. When registering I found a large persistant Cross site scripting vulnerability. I immediately informed the developers and also wrote a proof of concept of how it could be exploited, that I would like to demonstrate.

I discovered that on the registration page, The developer never sanitizes the “username” input field, nor is it sanitized or stripped on output into the admin panel. I discovered this originally by using



as my registrating name. I was then automatically logged in and the “lolhixss” popup followed. I also recieved a message from the admin (my friend) who told me it also popped up in the admin panel.In order to steal the admin session, all that was required was for me to write a small php file, I called it xss.php. All it does is record the parameter “c” passed in the url to a file.

$cookie = $_GET["c"];

$stolencookies = fopen("cookiefile.txt", "a");

fwrite($stolencookies, $cookie ."n");

fclose($stolencookies);

?>

In order to steal the cookies, I used the script...

as my username. When this was executed in the admin panel. It appended the admins cookie to the end of the url, which was then stored into my cookiefile.txt file. Using Tamper Data (a firefox plugin similar to burp) I modified my http headers and other paramaters to contain the admin cookie that was retrieved. I then refreshed the page and was logged in as the admin.

In order to prevent attacks like this, the developer needs to escape and sanitize the users input. Also having a limit on the size of a username would only be helpful. It is just as important to sanitize the output as well.

More information can be found here and here https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Hax brah!

EDIT:  I submitted this finding to exploit-db.com Here Hopefully the first of many!