vCAP RegisterPage.cgi statusmsg Variable XSS

2006-09-11T14:48:54
ID OSVDB:28810
Type osvdb
Reporter AliG()
Modified 2006-09-11T14:48:54

Description

Vulnerability Description

vCAP contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'statusmsg' variable upon submission to the RegisterPage.cgi script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

vCAP contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'statusmsg' variable upon submission to the RegisterPage.cgi script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]:6100/RegisterPage.cgi?statusmsg=[XSS]&session=1

References:

Vendor URL: http://www.pscs.co.uk/ Secunia Advisory ID:21862 Related OSVDB ID: 28807 Related OSVDB ID: 28809 Related OSVDB ID: 28808 FrSIRT Advisory: ADV-2006-3569 CVE-2006-5035