JpGraph 3.0.6 XSS Vulnerability

2009-12-25 / 2009-12-26
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

XSS Vulnerability in JpGraph 3.0.6 Discovered by Martin Barbella <barbella (at) sas.upenn (dot) edu [email concealed]> Description of Vulnerability: ----------------------------- JpGraph is an object oriented library for PHP that can be used to create various types of graphs which also contains support for client side image maps. The GetURLArguments function for the JpGraph's Graph class does not properly sanitize the names of get and post variables, leading to a cross site scripting vulnerability. Systems affected: ----------------- This has been confirmed in version 3.0.6 of JpGraph's free release. Previous versions and the professional versions may be affected as well. Impact: ------- When a user is tricked into clicking on a malicious link or submitting a specially crafted form, the injected code travels to the vulnerable web server, which reflects the attack back to the user??s browser. The browser then executes the code because it came from a "trusted" server. (From OWASP: http://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29) Mitigating factors: ------------------- The vulnerability seems to be exploitable only in cases where client side image maps are used. Proof of concept: ----------------- This can be demonstrated in the csim_in_html_ex1.php example provided with jpgraph (as well various other csim examples) as shown below. http://site/csim_in_html_ex1.php?"/><script>alert('XSS')</script>=arbitr ary Solution: --------- The following patch can be applied to jpgraph.php to correct the vulnerability. --- jpgraph.php.orig 2009-11-14 14:45:01.000000000 -0500 +++ jpgraph.php 2009-11-14 14:55:34.000000000 -0500 @@ -1286,11 +1286,11 @@ while( list($key,$value) = each($_GET) ) { if( is_array($value) ) { foreach ( $value as $k => $v ) { - $urlarg .= '&'.$key.'%5B'.$k.'%5D='.urlencode($v); + $urlarg .= '&'.urlencode($key).'%5B'.urlencode($k).'%5D='.urlencode($v); } } else { - $urlarg .= '&'.$key.'='.urlencode($value); + $urlarg .= '&'.urlencode($key).'='.urlencode($value); } } @@ -1301,11 +1301,11 @@ while( list($key,$value) = each($_POST) ) { if( is_array($value) ) { foreach ( $value as $k => $v ) { - $urlarg .= '&'.$key.'%5B'.$k.'%5D='.urlencode($v); + $urlarg .= '&'.urlencode($key).'%5B'.urlencode($k).'%5D='.urlencode($v); } } else { - $urlarg .= '&'.$key.'='.urlencode($value); + $urlarg .= '&'.urlencode($key).'='.urlencode($value); } }

Referencje:

http://www.securityfocus.com/archive/1/archive/1/508586/100/0/threaded
http://secunia.com/advisories/37832
http://osvdb.org/61268


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top