ID CVE-2006-1417 Type cve Reporter cve@mitre.org Modified 2017-07-20T01:30:00
Description
Multiple cross-site scripting (XSS) vulnerabilities in Caloris Planitia Online Quiz System (aka Web Quiz pro), possibly 1.0, allow remote attackers to inject arbitrary web script or HTML via the (1) exam parameter in prequiz.asp or (2) msg parameter in student.asp.
{"osvdb": [{"lastseen": "2017-04-28T13:20:20", "bulletinFamily": "software", "cvelist": ["CVE-2006-1417"], "edition": 1, "description": "## Vulnerability Description\nWeb Quiz contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'msg' variable upon submission to the student.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nWeb Quiz contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'msg' variable upon submission to the student.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\n/student.asp?msg=[XSS]\n## References:\nVendor URL: http://www.calorisplanitia.com/online-quiz-system.aspx\n[Secunia Advisory ID:19416](https://secuniaresearch.flexerasoftware.com/advisories/19416/)\n[Related OSVDB ID: 24129](https://vulners.com/osvdb/OSVDB:24129)\nOther Advisory URL: http://pridels.blogspot.com/2006/03/web-quiz-pro-xss-vuln.html\nFrSIRT Advisory: ADV-2006-1091\n[CVE-2006-1417](https://vulners.com/cve/CVE-2006-1417)\nBugtraq ID: 17255\n", "modified": "2006-03-27T03:32:38", "published": "2006-03-27T03:32:38", "href": "https://vulners.com/osvdb/OSVDB:24130", "id": "OSVDB:24130", "type": "osvdb", "title": "Web Quiz student.asp msg Variable XSS", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-04-28T13:20:20", "bulletinFamily": "software", "cvelist": ["CVE-2006-1417"], "edition": 1, "description": "## Vulnerability Description\nWeb Quiz contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'exam' variable upon submission to the prequiz.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nWeb Quiz contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'exam' variable upon submission to the prequiz.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\n/prequiz.asp?examid=1&exam=[XSS]\n## References:\nVendor URL: http://www.calorisplanitia.com/online-quiz-system.aspx\n[Secunia Advisory ID:19416](https://secuniaresearch.flexerasoftware.com/advisories/19416/)\n[Related OSVDB ID: 24130](https://vulners.com/osvdb/OSVDB:24130)\nOther Advisory URL: http://pridels.blogspot.com/2006/03/web-quiz-pro-xss-vuln.html\nFrSIRT Advisory: ADV-2006-1091\n[CVE-2006-1417](https://vulners.com/cve/CVE-2006-1417)\nBugtraq ID: 17255\n", "modified": "2006-03-27T03:32:38", "published": "2006-03-27T03:32:38", "href": "https://vulners.com/osvdb/OSVDB:24129", "id": "OSVDB:24129", "type": "osvdb", "title": "Web Quiz prequiz.asp exam Variable XSS", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "exploitdb": [{"lastseen": "2016-02-03T06:02:13", "description": "Online Quiz System 0 prequiz.asp exam Parameter XSS. CVE-2006-1417. Webapps exploit for asp platform", "published": "2006-03-27T00:00:00", "type": "exploitdb", "title": "Online Quiz System - prequiz.asp exam Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-1417"], "modified": "2006-03-27T00:00:00", "id": "EDB-ID:27480", "href": "https://www.exploit-db.com/exploits/27480/", "sourceData": "source: http://www.securityfocus.com/bid/17255/info\r\n\r\nOnline Quiz System is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. \r\n\r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nhttp://www.example.com/prequiz.asp?examid=1&exam=[XSS]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/27480/"}, {"lastseen": "2016-02-03T06:02:22", "description": "Online Quiz System 0 student.asp msg Parameter XSS. CVE-2006-1417. Webapps exploit for asp platform", "published": "2006-03-27T00:00:00", "type": "exploitdb", "title": "Online Quiz System - student.asp msg Parameter XSS", "bulletinFamily": "exploit", "cvelist": ["CVE-2006-1417"], "modified": "2006-03-27T00:00:00", "id": "EDB-ID:27481", "href": "https://www.exploit-db.com/exploits/27481/", "sourceData": "source: http://www.securityfocus.com/bid/17255/info\r\n \r\nOnline Quiz System is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. \r\n \r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nhttp://www.example.com/student.asp?msg=[XSS]", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/27481/"}]}