webgrind 1.0 (dataFile) Remote Reflected XSS Vulnerability

2012-02-17 / 2012-08-15
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

webgrind 1.0 (dataFile) Remote Reflected XSS Vulnerability Vendor: Joakim Nygard and Jacob Oettinger Product web page: http://code.google.com/p/webgrind Affected version: 1.0 Summary: Webgrind is an Xdebug profiling web frontend in PHP5. Desc: webgrind suffers from a XSS vulnerability when parsing user input to the 'dataFile' parameter via GET method in the index.php script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session. ---------------------------------------- /index.php: ----------- 24: case 'function_list': 25: $dataFile = get('dataFile'); ---------------------------------------- Tested on: Microsoft Windows XP Professional SP3 (EN) Apache 2.2.21 PHP 5.3.9 MySQL 5.5.20 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Vendor status: [13.02.2012] Vulnerability discovered. [16.02.2012] Vendor notified. [17.02.2012] Public security advisory released. Advisory ID: ZSL-2012-5073 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5073.php Vendor: http://code.google.com/p/webgrind/issues/detail?id=65 13.02.2012 --- http://localhost/webgrind/index.php?dataFile=<script>alert("ZSL");</script>&costFormat=msec&showFraction=1&hideInternals=0&op=function_list

References:

http://code.google.com/p/webgrind/issues/detail?id=65
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5073.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top