Cross site scripting (XSS) in broadcast machine

2007.11.15
Credit: Hanno Boeck
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Source: http://int21.de/cve/CVE-2007-3694-bm.html Cross site scripting (XSS) in broadcast machine References http://www.getmiro.com/create/broadcast/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3694 Description Cross site scripting describes attacks that allow to insert malicious html or javascript code via get or post forms. This can be used to steal session cookies. Broadcast machine is a web-based video platform tool. It's login form is vulnerable to XSS. Sample code <form action="http://somesite.com/login.php" method="post"> <input type="text" name="username" value='"<script>alert(1)</script>'> <input type="submit"></form> Workaround/Fix Vendor consideres broadcast machine dead software and won't provide any updates. However it's still used on some live sites in the internet. CVE Information The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-3694 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. Credits and copyright This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting. It's licensed under the creative commons attribution license. Hanno Boeck, 2007-11-12, http://www.hboeck.de -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.7 (GNU/Linux) iD8DBQBHOE0rr2QksT29OyARAkS2AJ90gXA6QDni/o4yRTor6JETPJmgfQCggch+ jDHiO2S9hCmCm8r8MulWwh4= =SIIi -----END PGP SIGNATURE-----


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top