Possible attack!!!

When i create an account and i receive the email to activate my account... i click on the link and i see:

Possible attack!!! All data has been collected and sent to the site owner for analysis.

whats the big deal????

Quote · 16 Nov 2009

the same thing happened to me too. At least in my case was just add an emoticon in the field devoted to the description to defeat the registration and start the usual mail about a possible attack

 

Total impact: 50
Affected tags: xss, csrf, id, rfe, lfi

Variable: REQUEST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte è così lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p>
Impact: 25 | Tags: xss, csrf, id, rfe, lfi
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

Variable: POST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte è così lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p>
Impact: 25 | Tags: xss, csrf, id, rfe, lfi
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

REMOTE_ADDR: XXXXXXXXXXXXXXXXX
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
Quote · 16 Nov 2009

For the record, my inbox has about 250 emails that indicate possible attacks lol

Quote · 16 Nov 2009

When i create an account and i receive the email to activate my account... i click on the link and i see:

Possible attack!!! All data has been collected and sent to the site owner for analysis.

whats the big deal????

Please provide email with attack description.

Rules → http://www.boonex.com/terms
Quote · 17 Nov 2009

the same thing happened to me too. At least in my case was just add an emoticon in the field devoted to the description to defeat the registration and start the usual mail about a possible attack

Total impact: 50
Affected tags: xss, csrf, id, rfe, lfi

Variable: REQUEST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte è così lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p>
Impact: 25 | Tags: xss, csrf, id, rfe, lfi
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

Variable: POST.DescriptionMe.0 | Value: <p><strong><em>Nessuna notte è così lunga da impedire al sole di risorgere<img title=\"Kiss\" src=\"http://www.XXXXXXX.com/plugins/tiny_mce/plugins/emotions/img/smiley-kiss.gif\" border=\"0\" alt=\"Kiss\" /></em></strong></p>
Impact: 25 | Tags: xss, csrf, id, rfe, lfi
Description: finds html breaking injections including whitespace attacks | Tags: xss, csrf | ID: 1
Description: finds attribute breaking injections including whitespace attacks | Tags: xss, csrf | ID: 2
Description: Detects JavaScript location/document property access and window access obfuscation | Tags: xss, csrf | ID: 23
Description: Detects obfuscated script tags and XML wrapped HTML | Tags: xss | ID: 33
Description: Detects possibly malicious html elements including some attributes | Tags: xss, csrf, id, rfe, lfi | ID: 38
Description: finds attribute breaking injections including obfuscated attributes | Tags: xss, csrf | ID: 68

REMOTE_ADDR: XXXXXXXXXXXXXXXXX
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:

Please try fixes described in this ticket: http://www.boonex.com/trac/dolphin/ticket/1467

You need to replace files which were changed in these revisions and follow additional steps described in the ticket comments.

Rules → http://www.boonex.com/terms
Quote · 17 Nov 2009
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.