Scout Portal Toolkit SPT--BrowseResources.php ParentId Variable XSS

2005-12-10T10:23:13
ID OSVDB:21630
Type osvdb
Reporter Preddy()
Modified 2005-12-10T10:23:13

Description

Vulnerability Description

Scout Portal Toolkit (SPT) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ParentId' variable upon submission to the SPT--BrowseResources.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Scout Portal Toolkit (SPT) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ParentId' variable upon submission to the SPT--BrowseResources.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/Projects/SPT/demo/SPT--BrowseResources.php?ParentId=<script>alert(document.cookie)</script>

References:

Vendor URL: http://scout.wisc.edu/Projects/SPT/ Secunia Advisory ID:17979 Related OSVDB ID: 21631 Related OSVDB ID: 21632 Related OSVDB ID: 21624 Related OSVDB ID: 21636 Related OSVDB ID: 21633 Related OSVDB ID: 21634 Related OSVDB ID: 21635 Other Advisory URL: http://www.x-illusion.com/rs/Scout%20Portal%20Toolkit.txt