Simplog login.php btag Variable XSS

2006-04-11T06:32:38
ID OSVDB:24562
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2006-04-11T06:32:38

Description

Vulnerability Description

Simplog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'btag' variable upon submission to the login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 0.9.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Simplog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'btag' variable upon submission to the login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/[path]/login.php?btag=<script>alert(document.cookie)</script>

References:

Vendor URL: http://www.simplog.org/ Vendor Specific Solution URL: http://www.simplog.org/archive.php?blogid=1&pid=56 Secunia Advisory ID:19628 Related OSVDB ID: 24559 Related OSVDB ID: 24560 Related OSVDB ID: 24561 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0232.html Generic Exploit URL: http://milw0rm.com/exploits/1663 FrSIRT Advisory: ADV-2006-1332 CVE-2006-1779 Bugtraq ID: 17493