WebCT Campus Edition XSS

2004-03-28T06:02:15
ID OSVDB:4669
Type osvdb
Reporter Simon Boulet(simon.boulet@divahost.net)
Modified 2004-03-28T06:02:15

Description

Vulnerability Description

WebCT Campus Edition contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate URL variables upon submission to the @import function. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known workarounds or upgrades to correct this issue. However, WebCT has released a patch to address this vulnerability.

Short Description

WebCT Campus Edition contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate URL variables upon submission to the @import function. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

A user could post the following code through a forum thread:

<style type="text/css"> import url(javascript:alert(document.cookie)); </style>

References:

Vendor URL: http://www.webct.com/ce4 Secunia Advisory ID:11242 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0295.html Keyword: WebCT,Campus,XSS ISS X-Force ID: 15652