Home / vulnerabilities blizzard-sanity.txt
Posted on 03 July 2007
Source : packetstormsecurity.org Link
Blizzard.com fails to properly sanitize user-supplied input resulting in
information disclosure:
http://www.blizzard.com/wow/ssotd/screenshot.aspx?imageindex=1027&Set=%00
Note the fact that their webroot is on the C: partition.
"C:weblizzard.comwowssotdscreenshot.aspx"
*Version Information:* Microsoft .NET Framework Version:1.1.4322.2032;
ASP.NET Version:1.1.4322.2032 <-- lol (outdated/missing a hotfix or two)
http://www.blizzard.com/wow/ssotd/screenshot.aspx?imageindex=1027'&Set=0
<--- probably vulnerable to SQL injection but I don't want to try it.
http://www.blizzard.com/wow/ssotd/screenshot.aspx?imageindex=1027&Set=0
<--- should recieve this image, not the first image...meaning something
is happening to the query
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/