by r0t,der4444,cembo,VietMafia

Thursday, April 20, 2006

Portal Pack 6 XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 20 april 2006
vendor:www.kcscripts.com/scripts/portal-pack.htm
affected versions:6.0 and prior
###############################################


Vuln. Description:


Portal Pack contains a flaws that allows a remote cross site scripting attacks.
Those flaws exists because input passed to "sort_order" parameter in "calendar/Visitor.cgi" and "news/NsVisitor.cgi" and input passed to"q" parameter in "search/search.cgi" and input passed to "cat_id" parameter in "classifieds/viewcat.cgi" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.


examples:

/cgi-bin/calendar/Visitor.cgi?job=view_event&eventNo=
0&sort_order=[XSS]

/cgi-bin/news/NsVisitor.cgi?job=view_article&articleNo=
0&sort_order=[XSS]

/cgi-bin/search/search.cgi?q=[XSS]

/cgi-bin/classifieds/viewcat.cgi?cat_id=[XSS]


###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew