# Exploit Title :PlentyofFish (POF) Cross Site Scripting ( Reflected)
# *Vendor*: www.vk.com
# Author: Juan Carlos Garca (NightSec)
# Blog: http://hackingmadrid.blogspot.com
# Facebook http://www.facebook.com/pages/ETHICAL-HACKING-Y-OL%C3%89-by-the-Face-WhiteHat/172393869485449?sk=app_190322544333196
PlentyofFish (POF) is an online dating site, popular primarily in Canada, the United Kingdom, Australia, Brazil and the United States.The company, based in Vancouver, British Columbia generates revenue through advertising. While it is free to use, POF offers premium services as part of their upgraded membership, such as seeing the date and time a user viewed your profile and allowing you to see whether a user read and/or deleted your message.
According to Compete.com's site traffic tracking, Plentyoffish attracted 5.3 million visitors in February 2011
On January 21, 2011, it was discovered that the PlentyofFish website had been hacked which exposed the personal and password information on nearly 30 million user accounts. Since the alleged hacking incident, Frind alleges he has identified persons he believes are responsible for the hacking, and alleges he is threatening legal action in response to the widespread negative media exposure. At the time this received global media exposure and security experts blame PlentyofFish for the security and privacy lapse specifically for keeping user's passwords unsecured.
On February 28, 2012, the parents of US Army Lieutenant Peter Burks sued PlentyofFish. The parents' lawsuit alleges photos of their son, who was killed in Iraq in 2007, were used without permission. The parents are seeking compensatory and punitive damages.
When an attacker gets a user's browser to execute his/her code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read, modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. Cross-site Scripting attacks essentially compromise the trust relationship between a user and the web site. Applications utilizing browser object instances which load content from the file system may execute code under the local machine zone allowing for system compromise.
Proof Of Concept ( PoC)