BookReview contact.htm user Variable XSS

2005-05-26T20:13:34
ID OSVDB:16874
Type osvdb
Reporter Lostmon Lords(Lostmon@gmail.com)
Modified 2005-05-26T20:13:34

Description

Vulnerability Description

BookReview contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'user' variable upon submission to the 'contact.htm' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

BookReview contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'user' variable upon submission to the 'contact.htm' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/contact.htm?user=admin%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E

References:

Security Tracker: 1014058 Related OSVDB ID: 16873 Related OSVDB ID: 16875 Related OSVDB ID: 16880 Related OSVDB ID: 16879 Related OSVDB ID: 16871 Related OSVDB ID: 16876 Related OSVDB ID: 16877 Related OSVDB ID: 16878 Related OSVDB ID: 16872 Related OSVDB ID: 16881 Other Advisory URL: http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html CVE-2005-1782 Bugtraq ID: 13783