SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   MediaPartner Vendors:   eMotion, Inc.
eMotion MediaPartner Input Validation Errors Disclose Files and Permit Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1012838
SecurityTracker URL:  http://securitytracker.com/id/1012838
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 11 2005
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  
Version(s): 5.0
Description:   An input validation vulnerability was reported in eMotion's MediaPartner. A remote user can view files on the system and conduct cross-site scripting attacks.

Portcullis reported that a remote user can supply a request containing '../' directory traversal characters to view files on the target system with the privileges of the target web service. A demonstration exploit URL is provided:

http://[target]/../../../boot.ini

The server's directory-browsing page does not properly filter HTML code from user-supplied input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the MediaPartner software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:

http://[target]/../../<script>alert(.portcullis.)</script>../../

Impact:   A remote user can view files on the target system with the privileges of the target web service.

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Media Partner software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.emotion.com/ (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents

Subject:  Portcullis Security Advisory 05-010


Portcullis Security Advisory
 
Vulnerable System: 
      
MediaPartner 5.0
 
Vulnerability Title:  
 
Directory Traversal Vulnerability and Cross Site Scripting Issue
 
Vulnerability discovery and development: 
 
Portcullis Security Testing Service
 
Affected systems: 
 
Emotion MediaPartner Web Server Version 5.0 (5.1 not confirmed)
 
Details:
 
The MediaPartner 5.0 web-server is vulnerable to directory
traversal.  By specifying an HTTP request containing the string
'../' an attacker can gain access to files outside of the intended
web-published file system directory.
 
The directory-browsing page generated by the directory traversal
vulnerability is vulnerable to URL cross-site scripting
vulnerability.
 
 
Impact:
 
This allows an attacker to gain access to any file on the drive the
web-published file system is installed to.
 
An attacker can craft a URL that contains malicious code.  When a
victim follows the URL the malicious code is executed by their
browser.
 
 
Exploit:
 
No exploit Code required. Examples: http://target_ip/../../../boot.ini
http://target_ip/../../<script>alert(.portcullis.)</script>../../
 
Copyright: 
 
Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without
 the express written consent of Portcullis Computer Security Limited.
 
Disclaimer: 
 
The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition.
 There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the
 user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever
 arising out of or in connection with the use or spread of this information.
 
 
 


*************************************************************
The information in this email is confidential and may be
legally privileged. It is intended solely for the addressee.
Any opinions expressed are those of the individual and do not
represent the opinion of the organisation. 
Access to this email by persons other than the intended
recipient is strictly prohibited.
If you are not the intended recipient, any disclosure, copying,
distribution or other action taken or omitted to be taken in
reliance on it, is prohibited and may be unlawful. 
When addressed to our clients any opinions or advice contained
in this email is subject to the terms and conditions expressed
in the applicable Portcullis Computer Security Limited terms
of business.
**************************************************************


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC