[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] XSS in Oracle default fcgi-bin/echo
The mere mention of fcgi-bin/echo in your first mail is enough for
anybody to derive the PoC. Here's what I found in under a minute:
Anybody with a days work in Web Application security would be able to
figure this out knowing the vulnerable script.
Just my two cents.
On 10/14/10, paul.szabo@xxxxxxxxxxxxx <paul.szabo@xxxxxxxxxxxxx> wrote:
> Dear Thor,
> Amazing how people claim being logical ... sure sign they aren't!
>> ... Irrespective of the method you choose to validate "bona-fide"
>> recipients of your PoC, you will have no control over what the
>> recipient chooses to do with it once they have it. As such, logic
>> dictates that your PoC be considered "public" the moment you release
>> it. ...
> Does logic dictate that all people are rabid pro-disclosure zealots,
> who do not respect copyright, IP rights, nor gentle personal requests
> for discretion?
>> ... don't fool yourself into thinking you are somehow being
>> responsible ...
> I do not own an over-inflated ego.
>> ... or simply send the code to Oracle and ask them ...
> Sorry to blow your assumption: sent to Oracle, ages ago, first thing.
> Cheers, Paul
> Paul Szabo psz@xxxxxxxxxxxxxxxxx http://www.maths.usyd.edu.au/u/psz/
> School of Mathematics and Statistics University of Sydney Australia