[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Re: [badroot security] AutoIndex PHP Script: XSS vulnerability
From: mozako <mozako () mybox ! it>
Date: 2005-07-05 21:04:16
Message-ID: 42CB09C4.1050303 () mybox ! it
[Download RAW message or body]
Sorry for distraction errors.
This is the correct ADV:
_______________________________________________________
BADROOT SECURITY GROUP
Security Advisory 2005-#0x07
http://www.badroot.org
irc.us.azzurra.org ~ #badroot
_______________________________________________________
Authors ....... mozako feat shen139
Date .......... 05-07-2005
Product ....... AutoIndex PHP Script
Type .......... Cross Site Scripting (XSS) vulnerability
o Description:
=============================
AutoIndex PHP Script is a simply website directory indexer and file
manager.
o Vulnerability Description:
=============================
287 [...]
288 $search = (isset($_GET['search']) ? $_GET['search'] : '');
289 $search_mode = (isset($_GET['searchMode']) ? $_GET['searchMode']
> '');
290 [...]
At line 289 AutoIndex PHP Script doesn't validate '$_GET' variable
($search).
Consequently, a remote user can create an specially crafted
URL that would execute arbitrary code in a user's browser within
the trust relationship between the browser and the server.
o Products:
=============================
- AutoIndex PHP Script v. 1.5.2 (tested)
o Solution:
=============================
Sanitize html source before writing it with a simply htmlspecialchars(...).
o Proof of concept:
=============================
http://www.vuln-site.org/index.php?search='>%3Cscript%3Ealert%28%27owned%27%29%3Blocation.href%3D%27http%3A%2F%2Fwww.badroot.org%27%3B%3C%2Fscript%3E&dir=&searchMode= \
Original ADV: http://www.badroot.org/advisories/SA0x07
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic