by r0t,der4444,cembo,VietMafia

Monday, March 27, 2006

WebAPP multiple XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 27 march 2006
vendor:http://www.web-app.org/
affected versions: 0.9.9.3.2 and prior
###############################################

Vuln. description:


WebAPP contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "action","id","num","board","cat","real","viewcat","img","curcatname" paremters in "index.cgi" and "vsSD" paremter in "/mods/calendar/index.cgi" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.



examples:

http://victim/cgi-bin/index.cgi?action=[XSS]

http://victim/cgi-bin/index.cgi?action=&id=[XSS]

http://victim/cgi-bin/index.cgi?action=forum
&board=chitchat&op=&num=[XSS]

http://victim/cgi-bin/index.cgi?action=&board=[XSS]

http://victim/cgi-bin/index.cgi?action=&cat=[XSS]

http://victim/cgi-bin/index.cgi?action=
otherarticles&writer=&real=[XSS]

http://victim/cgi-bin/index.cgi?action=&viewcat=[XSS]

http://victim/cgi-bin/index.cgi?action=printtopic&id=
1&curcatname=&img=[XSS]

http://victim/cgi-bin/index.cgi?action=printtopic&id=
1&curcatname=[XSS]

http://victim/cgi-bin/mods/calendar/index.cgi?vsSD=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

1 Comments:

Anonymous Anonymous told...

just try this : /victim/cgi-bin/index.cgi?action=printtopic&id=XSS and get and "what are you doing stan?."

Also the second one you`ve posted.

Better next time when you post a vuln check twice.

9:12 PM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew