Asn Guestbook header.php version Variable XSS

2005-07-20T14:30:22
ID OSVDB:18227
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-07-20T14:30:22

Description

Vulnerability Description

Asn Guestbook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'version' variable upon submission to the 'header.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Asn Guestbook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'version' variable upon submission to the 'header.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/[path]/header.php?version=</title><script>alert(document.cookie)</script>

References:

Vendor URL: http://script.tourdebali.com/asnguestbook.html Security Tracker: 1014555 Secunia Advisory ID:16202 Related OSVDB ID: 18228 Other Advisory URL: http://www.rgod.altervista.org/asnguestbook.html ISS X-Force ID: 21501 Bugtraq ID: 14356