netscapeXSS.txt

2006-06-26T00:00:00
ID PACKETSTORM:47671
Type packetstorm
Reporter David "Aesthetico" Vieira-Kurz
Modified 2006-06-26T00:00:00

Description

                                        
                                            `Netscape.com - Cross site scripting vulnerability  
----------------------------------------------  
Type: Cross site scripting  
  
Date: June, 13th 2006  
----------------------------------------------  
  
Credits:  
----------------------------------------------  
Discovered by: David "Aesthetico" Vieira-Kurz  
http://www.majorsecurity.de  
----------------------------------------------  
  
Affected pages:  
----------------------------------------------  
1. http://netscape.com  
2. http://search.netscape.com  
3. http://channels.netscape.com  
  
Vulnerability:  
----------------------------------------------  
I found a bug in the search boxes of the Netscape Network.  
If you type in a "searchword" into the searchbox of "http://netscape.com" or "http://channels.netscape.com"  
you'll be automaticly redirected to "http://search.netscape.com" and you'll see the results of your search.  
  
Input passed to the "query" parameter in "search?"-file is not properly sanitised before being returned to the user.   
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.  
  
Sending a malicious code will result a code working on the page that pops up...  
  
http://search.netscape.com/ns/search?query=<script>alert("MajorSecurity")</script>  
  
Example:  
----------------------------------------------  
http://search.netscape.com/ns/search?query=<script>alert("MajorSecurity")</script>  
  
Screenshots:  
----------------------------------------------  
http://majorsecurity.de/advisory/netscape_bug/netscape1.JPG  
http://majorsecurity.de/advisory/netscape_bug/netscape2.JPG  
http://majorsecurity.de/advisory/netscape_bug/netscape3.JPG  
`