Lucene search

K

sphider134-xss.txt

🗓️ 06 May 2008 00:00:00Reported by Christian HollerType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

Sphider XSS Vulnerability Sphider 1.3.4 PHP Search Engin

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`-----BEGIN PGP SIGNED MESSAGE-----  
Hash: SHA1  
  
Sphider Cross Site Scripting Vulnerability  
  
Original release date: 2008-04-29  
Last revised: 2008-05-06  
Latest version: http://users.own-hero.net/~decoder/advisories/sphider134-xss.txt  
Source: Christian Holler <http://users.own-hero.net/~decoder/>  
  
  
Systems Affected:  
  
Sphider 1.3.4 (http://www.sphider.eu/) - A PHP Search Engine  
  
Severity: Moderate  
  
  
Overview:  
  
Sphider is a search engine that has several features; one is a search suggestion  
feature as in "Did you mean xyz?" that corrects possible typos in your search,  
without however sanitizing this output. This feature is off by default, but  
turned on by many sites for convenience.  
  
I. Description  
  
The output of the suggestion feature in Sphider does output the complete query  
if there is at least one word in this query that has the script has found a   
possible correction for. This word is highlighted and the rest of the search  
query is returned as it is. However, this output is completely unsanitized,  
allowing HTML/Javascript to be included.  
  
II. Impact  
  
Depending on the site where this search script is deployed, this attack can be  
used to steal cookies from other users by tricking them into visiting a given  
URL.  
  
III. Proof of concept  
  
search.php?query=xsss%20%3Cscript%3Ealert('HELLO');%3C/script%3E&search=1  
  
where the first word in the query, "xsss" is a word that can be corrected by  
the search script. This generally depends on the indexed site(s) but such a  
word is very easy to find.  
  
IV. Solution  
  
Currently none, author has been informed.  
  
Timeline:  
  
2008-04-29: Author informed  
2008-05-06: Vulnerability notice published  
  
-----BEGIN PGP SIGNATURE-----  
Version: GnuPG v2.0.6 (GNU/Linux)  
  
iD8DBQFIIMGYJQIKXnJyDxURAm44AJ9JbT+63Krpg95BZatccKal29DhkwCgoAE9  
eNhj/JgskwQVKgmdnFBEVG0=  
=DZrL  
-----END PGP SIGNATURE-----  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo