Network Query Tool nqt.php portNum Variable XSS

2004-04-23T09:05:26
ID OSVDB:5672
Type osvdb
Reporter Janek Vind "waraxe"(come2waraxe@yahoo.com)
Modified 2004-04-23T09:05:26

Description

Vulnerability Description

Network Query Tool contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "portNum" variable upon submission to the "nqt.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Network Query Tool contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "portNum" variable upon submission to the "nqt.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/nqt.php?target=foobar.com&queryType=all&portNum=foobar[XSS CODE]

References:

Vendor URL: http://www.shat.net/php/nqt/ Secunia Advisory ID:11479 Related OSVDB ID: 5671 Other Advisory URL: http://www.zone.ee/waraxe/?modname=sa&id=024 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-04/0285.html Bugtraq ID: 10205