Metadot Portal Server userchannel.pl op Variable XSS

2004-01-12T17:32:18
ID OSVDB:3582
Type osvdb
Reporter JeiAr(jeiar@gulftech.org)
Modified 2004-01-12T17:32:18

Description

Vulnerability Description

Metadot Portal Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "op" variable upon submission to the "userchannel.pl" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 5.6.5.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Metadot Portal Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "op" variable upon submission to the "userchannel.pl" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/userchannel.pl?id=435&isa=NewsChannel&redirect=1&op="><iframe>

References:

Vendor URL: http://www.metadot.com/ Vendor Specific Advisory URL Security Tracker: 1008747 Secunia Advisory ID:10656 Other Advisory URL: http://www.gulftech.org/01122004.php Nessus Plugin ID:12024 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-01/0129.html ISS X-Force ID: 14858 Bugtraq ID: 9439