PortalApp login.asp ret_page Variable XSS

2005-12-21T01:03:51
ID OSVDB:21880
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-12-21T01:03:51

Description

Vulnerability Description

PortalApp contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ret_page' variable upon submission to the 'login.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PortalApp contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ret_page' variable upon submission to the 'login.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

/login.asp?ret_page=[XSS]

References:

Vendor URL: http://www.portalapp.com/ Secunia Advisory ID:18201 Other Advisory URL: http://pridels.blogspot.com/2005/12/portalapp-xss-vuln.html CVE-2005-4482 Bugtraq ID: 16008