Directory Listing Script index.php dir Variable XSS

2006-05-15T10:02:33
ID OSVDB:25534
Type osvdb
Reporter Kiki(federico.sana@alice.it)
Modified 2006-05-15T10:02:33

Description

Vulnerability Description

Directory Listing Script contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'dir' variable upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Directory Listing Script contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'dir' variable upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/[path]/index.php?dir=[code] http://[target]/[path]/index.php?dir="><script>alert("lol");</script>

References:

Vendor URL: http://evoluted.net/programs.php Secunia Advisory ID:20118 Other Advisory URL: http://kiki91.altervista.org/exploit/dir.txt FrSIRT Advisory: ADV-2006-1803