ht://Dig htsearch.cgi words Variable XSS

2002-06-26T03:38:48
ID OSVDB:7590
Type osvdb
Reporter Howard Yeend(h_bugtraq@yahoo.com)
Modified 2002-06-26T03:38:48

Description

Vulnerability Description

ht://Dig contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'words' variables upon submission to the 'htsearch.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

ht://Dig contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'words' variables upon submission to the 'htsearch.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/cgi-bin/htsearch.cgi?words=%22%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E

References:

Vendor URL: http://www.htdig.org/ Security Tracker: 1004661 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2002-06/0321.html ISS X-Force ID: 9433 Bugtraq ID: 5091