Xplico 0.5.7 cross site scripting

2010-07-03 / 2010-07-04
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Xplico v0.5.7 (add.ctp) Remote XSS Vulnerability Title: Xplico v0.5.7 (add.ctp) Remote XSS Vulnerability Type: Remote Impact: Cross-Site Scripting Release Date: 02.07.2010 Release mode: Coordinated release Summary ======= The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn?t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). Description =========== Xplico is vulnerable to Cross-Site Scripting vulnerability. An attacker can use the "POST" to take advantage of this vulnerability, injecting code into the web pages viewed by other users. -------------------------------------------------------------------------------- Detecting vulnerabilities - /opt/xplico/xi/app/views/pols/add.ctp:13 - /opt/xplico/xi/app/views/pols/add.ctp:14 - /opt/xplico/xi/app/views/sols/add.ctp:10 -------------------------------------------------------------------------------- Vendor ====== Xplico Team - http://www.xplico.org Affected Version ================ 0.5.7 PoC === - /opt/xplico/xi/app/views/pols/add.ctp:13 echo $form->input('Pol.name', array('maxlength'=> 50, 'size' => '50','label' => 'Case name')); Attack: Case name=[XSS] (POST) Credits ======= Vulnerability discovered by Marcos Garcia (@artsweb) and Maximiliano Soler (@maxisoler). Solution ======== Upgrade to Xplico v0.5.8 (http://sourceforge.net/projects/xplico/files/) Vendor Status ============= [22.06.2010] Vulnerability discovered. [22.06.2010] Vendor informed. [22.06.2010] Vendor replied. [24.06.2010] Asked vendor for confirmation. [24.06.2010] Vendor confirms vulnerability. [24.06.2010] Asked vendor for status. [24.06.2010] Vendor replied. [29.06.2010] Vendor reveals patch release date. [29.06.2010] Coordinated public advisory. References ========== [1] http://www.xplico.org/archives/710 Changelog ========= [02.07.2010] - Initial release Web: http://www.zeroscience.mk e-mail: lab@zeroscience.mk


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top