[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] XSS in Oracle default fcgi-bin/echo

Hi Paul,

The mere mention of fcgi-bin/echo in your first mail is enough for
anybody to derive the PoC. Here's what I found in under a minute:

Anybody with a days work in Web Application security would be able to
figure this out knowing the vulnerable script.

Just my two cents.

Riyaz Walikar

On 10/14/10, paul.szabo@xxxxxxxxxxxxx <paul.szabo@xxxxxxxxxxxxx> wrote:
> Dear Thor,
> Amazing how people claim being logical ... sure sign they aren't!
>> ... Irrespective of the method you choose to validate "bona-fide"
>> recipients of your PoC, you will have no control over what the
>> recipient chooses to do with it once they have it.  As such, logic
>> dictates that your PoC be considered "public" the moment you release
>> it. ...
> Does logic dictate that all people are rabid pro-disclosure zealots,
> who do not respect copyright, IP rights, nor gentle personal requests
> for discretion?
>> ... don't fool yourself into thinking you are somehow being
>> responsible ...
> I do not own an over-inflated ego.
>> ... or simply send the code to Oracle and ask them ...
> Sorry to blow your assumption: sent to Oracle, ages ago, first thing.
> Cheers, Paul
> Paul Szabo   psz@xxxxxxxxxxxxxxxxx   http://www.maths.usyd.edu.au/u/psz/
> School of Mathematics and Statistics   University of Sydney    Australia