Netquery nqgeoip2.php Multiple Variable XSS

2005-07-25T10:23:29
ID OSVDB:18279
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2005-07-25T10:23:29

Description

Vulnerability Description

Netquery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'step' and 'body' variables upon submission to the 'nqgeoip2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 3.11 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Netquery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'step' and 'body' variables upon submission to the 'nqgeoip2.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/[path]/nqgeoip2.php?step=<script>alert(document.cookie)</script> http://[target]/[path]/nqgeoip2.php?body=<script>alert(document.cookie)</script>

References:

Vendor URL: http://www.virtech.org/tools/ Vendor Specific Advisory URL Secunia Advisory ID:16216 Related OSVDB ID: 18281 Related OSVDB ID: 18283 Related OSVDB ID: 18277 Related OSVDB ID: 18276 Related OSVDB ID: 18280 Related OSVDB ID: 18284 Related OSVDB ID: 18278 Related OSVDB ID: 18282 Other Advisory URL: http://www.rgod.altervista.org/netquery.html Nessus Plugin ID:19301 ISS X-Force ID: 21582 Bugtraq ID: 14373