Bug: Boastmachine Cross Site Scripting Vulnerability ( Ascii Version )

Search:
WLB2

Boastmachine Cross Site Scripting Vulnerability

Published
Credit
Risk
2006.05.23
Yunus Emre Yilmaz
Low
CWE
CVE
Local
Remote
CWE-79
CVE-2006-2491
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

Advisory : Cross Site Scripting in Boastmachine (http://boastology.com/)

Release Date : 17/05/2005

Last Modified : 17/05/2005

Author : Yunus Emre Yilmaz ( http://yns.zaxaz.com)

Application : BoastMachine v3.1 ( maybe older versions)

Risk : High

Problem : Form action values in admin.php and index.php (maybe other pages) isn't properly sanitized before being
returned to page.Form action value

is otomatically coming from $_SERVER["PHP_SELF"];.And This is changeable from query string.

If I access page like admin.php/XSS $_SERVER["PHP_SELF"] returns as admin.php/XSS.So , an attacker basicly
inject malicious

HTML/JS codes into page.

Proof Of Concept : admin.php/"><script>alert('xss')</script>

Solution : Edit the source code , and change it $_SERVER["SCRIPT_NAME"] or filter it before printing in page.

Original Advisory : http://yns.zaxaz.com/advisories/bostmachine.txt

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version