ACS Blog Multiple BBcode Tag XSS

2005-03-28T05:55:30
ID OSVDB:15087
Type osvdb
Reporter Dan Crowley(dan.crowley@gmail.com)
Modified 2005-03-28T05:55:30

Description

Vulnerability Description

ACS Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the [link], [mail], and [img] BBcode tags upon submission to the comments section of ACS Blog. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
The pages affected by the flaw are: add_comment.asp, admin_entry.asp, inc_editor_buttons_safari.asp, inc_functions.asp, inc_javascripts.js, popup_insert_element.asp, popup_preview.asp, user_footer.asp, user_functions.asp.

Technical Description

The pages affected by the flaw are: add_comment.asp admin_entry.asp inc_editor_buttons_safari.asp inc_functions.asp inc_javascripts.js popup_insert_element.asp popup_preview.asp user_footer.asp user_functions.asp

Solution Description

Upgrade to version 1.1.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

ACS Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the [link], [mail], and [img] BBcode tags upon submission to the comments section of ACS Blog. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
The pages affected by the flaw are: add_comment.asp, admin_entry.asp, inc_editor_buttons_safari.asp, inc_functions.asp, inc_javascripts.js, popup_insert_element.asp, popup_preview.asp, user_footer.asp, user_functions.asp.

Manual Testing Notes

[link=[site]' onmouseover='[code]' o=']text[/link] [mail=[mail]' onmouseover='[code]")' o=']text[/mail] [img]<site>' onload='[code]' o='[/img]

References:

Vendor URL: http://www.asppress.com/category.asp?CATEGORY_ID=1 Security Tracker: 1013584 Secunia Advisory ID:14744 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-03/0476.html ISS X-Force ID: 19864 CVE-2005-0945 Bugtraq ID: 12921