Bug bounty research: hot or not - 13 Jul 2016
Scornhub - 26 May 2016
The meaning of life tastes like chicken - 24 Feb 2016
fucking astrology man - 09 Dec 2015
Freelance Consulting - 23 Nov 2015
The Wassenaar Effect - 09 Jun 2015
Scantastic! - 11 Feb 2015
It's all fucked - 05 Jan 2015
The tortured poet - 28 Dec 2014
Gone in 660 Seconds - 25 Nov 2014
College Graduation - 20 Nov 2014
Yahoo for the craic! - 21 Sep 2014
IRC what you did there... - 02 Aug 2014
Let me Bug you!? - 19 Jun 2014
Plesk 10 & 11 SSO XXE/XSS - 09 May 2014
Final Year Woes - 24 Apr 2014
SWMing in privilege, or drowning? - 10 Apr 2014
Lucid Surrealist Dreams and techno-lust. - 23 Mar 2014
New Raspberry piToy - 05 Feb 2014
Happy 2014! - 15 Jan 2014
Helpdesk Pilot Xss/CSRF Add an Admin - 30 Nov 2013
Squidoo.com $1,100 bug bounty - 02 Nov 2013
Yahoo Xss bug bounty - 01 Oct 2013
Moodle 2.0 Account Takeover - 04 Sep 2013
Xss Challenge Accepted - 17 Aug 2013
rpliy - rpi python web player - 25 Jul 2013
Busy times - 10 Jul 2013
Source Conference - 27 May 2013
Coinbase.com bug bounty - 04 May 2013
Xssive, Moodle and CSRF - 11 Apr 2013

Yahoo Pipes is Great! - 05 Mar 2013
Science Hack-day Dublin - 03 Mar 2013
Simple port scan - 26 Feb 2013
4chan-tool.py - 19 Feb 2013
Wix.com Xss - 11 Feb 2013
Crawl.py Url Crawling - 09 Feb 2013
Xssive Demo tool - 12 Jan 2013
Cyberbullying? - 27 Dec 2012
Merry XssMas - 24 Dec 2012
Watching BBC Streams - 10 Dec 2012
SWF Disassembly - 26 Nov 2012
C <3 - 16 Nov 2012
Greasemonkey XSS 2 - 21 Oct 2012
Work Logging App - 20 Oct 2012
Greasemonkey XSS - 30 Sep 2012
Guestbook XSS - 18 Sep 2012
OWASP Vicnum Project - 05 Sep 2012
August... - 05 Sep 2012
XSS Scenarios. - 30 Jul 2012
Imageroll - 06 Jul 2012
The Dangers of XSS - 14 Jun 2012

US Threat Gauge - 30 May 2012
Is this art? - 28 May 2012
Rss2Irc - 25 May 2012
Blackboard Xss Jungle - 14 May 2012
Url Info Scraper - 10 May 2012
pythonchallenge.com - 27 Apr 2012
Prime Generator - 15 Apr 2012
Sockso 1.51 Xss - 07 Apr 2012


Ubuntu 10.10 Hardening - 18 Mar 2012
2nd Year Revisited - 17 Mar 2012

Wix.com Xss

www.Wix.com is a great site that easily allows people create and host their own websites. It contains a very nice set of online site editors and tools. The last time I checked, wix hosted 26,756,521 user created websites and has over 25 million users. This is the only reason I deemed it very significant for them to fix the minor bugs I found.

As of now the two pretty significant Xss vulnerabilities I found on their main domain are fixed and all is well with the world :P These minor vulnerabilities are normally nothing to take too seriously, in this particular case it allowed a malicious attacker take over websites completely and possibly another couple of thousand while he's at it. Of course, it would be ethically questionable and completely illegal to write an xss self-propagating worm so it remains without proof that this was in fact possible.

The first and less serious Xss vulnerability was a reflective one in the search bar of the sites support forum. This of course could be exploited in the regular way of sending a malicious url to a particular known wix user. Another more devious way would have been to include the malicious url in an iframe on your page. (I'm unsure as to whether this is possible within wix's development tools). This would allow you to steal unaware wix users login session when they visited your site.

The second Xss vulnerability was a bit more serious as there is no way for the affected victims of knowing the exact javascript you have run, unless they are willing to disassemble an swf file. On your profile you could embed a malicious swf file from a remote location, this could run whatever javascript you please and most will be none the wiser. Using javascript it is possible to read any csrf tokens so along with stealing user logged in sessions, you could have made a worm that posts the same swf into other users profiles. This would result in a worm that spreads across the wix platform potentially affecting millions of users.

It may have taken a little bit of persistence when reporting the vulnerabilities but they promptly fixed the bugs and thanked me, for which I am of course grateful!

Hax Brah!