bitweaver wiki/edit.php Message Description Field XSS

2006-11-09T11:19:00
ID OSVDB:30344
Type osvdb
Reporter Benjamin Mossé(saps.audit@gmail.com), Laurent Gaffié(laurent.gaffie@gmail.com)
Modified 2006-11-09T11:19:00

Description

Vulnerability Description

bitweaver contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'Message' variable upon submission to the 'wiki/edit.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

bitweaver contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'Message' variable upon submission to the 'wiki/edit.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.bitweaver.org/ Secunia Advisory ID:22793 Related OSVDB ID: 30343 Related OSVDB ID: 30342 Related OSVDB ID: 30345 Other Advisory URL: http://securityreason.com/securityalert/2144 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html ISS X-Force ID: 30167 FrSIRT Advisory: ADV-2006-4485 CVE-2006-6925 Bugtraq ID: 20988 Bugtraq ID: 20996