Rapid Classified advsearch.asp dosearch Variable XSS

2006-11-19T04:34:16
ID OSVDB:30543
Type osvdb
Reporter Benjamin Mossé(saps.audit@gmail.com), Laurent Gaffié(laurent.gaffie@gmail.com)
Modified 2006-11-19T04:34:16

Description

Vulnerability Description

Rapid Classified contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'dosearch' variable upon submission to the advsearch.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Rapid Classified contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'dosearch' variable upon submission to the advsearch.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

/advsearch.asp?zipr=1&D1=0&D4=1&zipOpt=20&dosearch=[xss]

References:

Vendor URL: http://www.4u2ges.com/ Secunia Advisory ID:22985 Related OSVDB ID: 30539 Related OSVDB ID: 30541 Related OSVDB ID: 30540 Related OSVDB ID: 30538 Related OSVDB ID: 30542 Other Advisory URL: http://securityreason.com/securityalert/2142 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0369.html ISS X-Force ID: 30450 FrSIRT Advisory: ADV-2006-4632 CVE-2006-6929 Bugtraq ID: 21197