When i create an account and i receive the email to activate my account... i click on the link and i see:
Possible attack!!! All data has been collected and sent to the site owner for analysis.
whats the big deal????
When i create an account and i receive the email to activate my account... i click on the link and i see: Possible attack!!! All data has been collected and sent to the site owner for analysis. whats the big deal???? |
the same thing happened to me too. At least in my case was just add an emoticon in the field devoted to the description to defeat the registration and start the usual mail about a possible attack
Total impact: 50
Affected tags: xss, csrf, id, rfe, lfi Variable: REQUEST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte &egrave; cos&igrave; lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p> Impact: 25 | Tags: xss, csrf, id, rfe, lfi Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1 Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2 Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23 Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33 Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38 Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68 Variable: POST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte &egrave; cos&igrave; lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p> Impact: 25 | Tags: xss, csrf, id, rfe, lfi Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1 Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2 Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23 Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33 Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38 Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68 REMOTE_ADDR: XXXXXXXXXXXXXXXXX HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP: |
For the record, my inbox has about 250 emails that indicate possible attacks lol |
When i create an account and i receive the email to activate my account... i click on the link and i see: Possible attack!!! All data has been collected and sent to the site owner for analysis. whats the big deal???? Please provide email with attack description. Rules → http://www.boonex.com/terms |
the same thing happened to me too. At least in my case was just add an emoticon in the field devoted to the description to defeat the registration and start the usual mail about a possible attack Total impact: 50
Affected tags: xss, csrf, id, rfe, lfi Variable: REQUEST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte &egrave; cos&igrave; lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p> Impact: 25 | Tags: xss, csrf, id, rfe, lfi Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1 Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2 Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23 Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33 Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38 Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68 Variable: POST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte &egrave; cos&igrave; lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p> Impact: 25 | Tags: xss, csrf, id, rfe, lfi Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1 Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2 Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23 Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33 Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38 Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68 REMOTE_ADDR: XXXXXXXXXXXXXXXXX HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP: Please try fixes described in this ticket: http://www.boonex.com/trac/dolphin/ticket/1467 You need to replace files which were changed in these revisions and follow additional steps described in the ticket comments. Rules → http://www.boonex.com/terms |