BlankOL bol.cgi Multiple Variable XSS

2006-03-27T07:47:36
ID OSVDB:24124
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-03-27T07:47:36

Description

Vulnerability Description

BlankOL contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'file' and 'function' variables upon submission to the 'bol.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Technical Description

The version number originally listed in the advisory ("1 and prior") could not be independantly verified.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

BlankOL contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'file' and 'function' variables upon submission to the 'bol.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

/bol.cgi?file=[XSS] /bol.cgi?function=[XSS]

References:

Vendor URL: http://www.blankol.com/ Secunia Advisory ID:19387 Other Advisory URL: http://pridels.blogspot.com/2006/03/blankol-xss-vuln.html ISS X-Force ID: 25488 CVE-2006-1404 Bugtraq ID: 17265