[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    STG Security Advisory: [SSA-20041122-11] JSPWiki XSS vulnerability
From:       <advisory () stgsecurity ! com>
Date:       2004-11-24 3:00:02
Message-ID: 20041124030002.9537.qmail () www ! securityfocus ! com
[Download RAW message or body]



STG Security Advisory: [SSA-20041122-11] JSPWiki XSS vulnerability

Revision 1.0
Date Published: 2004-11-22 (KST)
Last Update: 2004-11-22
Disclosed by SSR Team (advisory@stgsecurity.com)

Summary
========
JSPWiki is one of famous wiki web applications. It has a cross site scripting
vulnerability.

Vulnerability Class
===================
Implementation Error: Input validation flaw

Details
=======
Due to an input validation flaw, the JSPWiki is vulnerable to cross site
scripting attacks.

http://[victim]/Search.jsp?query=&lt;script&gt;alert('hi')&lt;/script&gt;

Impact
======
Medium: Malicious attackers can inject and execute arbitrary script code in
a user's browser session in context of an affected site.

Workaround
==========
There is no known workaround at this time.

Affected Products
================
JSPWiki v2.1.120-cvs and prior

Vendor Status: NOT FIXED
=======================
2004-10-01 Vulnerability found.
2004-10-27 JSPWiki developer notified.
2004-11-22 Official release.

Credits
======
Jeremy Bae at STG Security
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic