Lucene search

K
packetstormJesper JurcenoksPACKETSTORM:67808
HistoryJul 01, 2008 - 12:00 a.m.

faname10-xss.txt

2008-07-0100:00:00
Jesper Jurcenoks
packetstormsecurity.com
31

EPSS

0.002

Percentile

54.6%

`netVigilance Security Advisory #43  
  
Fa Name version 1.0 Multiple XSS Attack Vulnerabilities  
Description:  
Fa Name   
(http://webscripts.softpedia.com/script/Content-Management/Fa-Name-41229.html)   
is useful portal (CMS) for .name websites. You can have a simple portal   
but useful one for you domain names and by using this portal you can   
show your complete information like photo, identification, projects and   
history to the others.  
  
Successful exploitation requires PHP magic_quotes_gpc set to Off on the   
server for the first vulnerability and register_globals set to On for   
the third.  
External References:  
Mitre CVE: CVE-2007-3653  
NVD NIST: CVE-2007-3653  
OSVDB:  
  
Summary:  
Fa Name is useful portal (CMS) for .name websites.  
Security problem in the product allows attackers to conduct XSS attacks.  
  
Advisory URL:  
http://www.netvigilance.com/advisory0043  
  
Release Date: June 30th 2008  
  
CVSS Version 2 Metrics:  
  
Base Metrics:  
Exploitability Metrics:  
Access Vector: Network  
Access Complexity: Medium  
Authentication: None  
Impact Metrics:  
Confidentiality Impact: None  
Integrity Impact: Partial  
Availability Impact: None  
Temporal Metrics:  
Exploitability: Functional  
Remediation Level: Workaround  
Report Confidence: Uncorroborated  
  
CVSS Version 2 Vectors:  
  
Base Vector: “AV:N/AC:L/Au:N/C:N/I:P/A:N”  
Temporal Vector: “E:F/RL:W/RC:UR”  
  
  
  
  
CVSS Version 2 Scores:  
  
Base Score: 4.3  
Impact Subscore: 2.9  
Exploitability Subscore: 8.6  
Temporal Score: 3.7  
SecureScout Testcase ID: TC 17973  
  
Vulnerable Systems:  
Fa Name version 1.0  
  
Vulnerability Type:  
XSS (Cross-Site Scripting) to force a web-site to display malicious   
contents to the target, by sending a specially crafted request to the   
web-site. The vulnerable web-site is not the target of attack but is   
used as a tool for the hacker in the attack of the victim (visitor to   
attached vulnerable website).  
  
Vendor:  
FaScript  
  
Vendor Status:  
The Vendor has been notified  
  
Workaround:  
In the php.ini file set register_globals = Off or/and magic_quotes_gpc = On.  
  
Example:  
XSS Attack Vulnerability 1:  
REQUEST:  
http://[TARGET]/[FANAME-DIRECTORY]/index.php?key="><script>alert(document.cookies)</script>  
REPLY:  
will execute <script>alert(document.cookie)</script>.  
  
XSS Attack Vulnerability 2:  
REQUEST:  
http://[TARGET]/[FANAME-DIRECTORY]/index.php?desc="><script>alert(document.cookies)</script>  
REPLY:  
will execute <script>alert(document.cookie)</script>.  
  
XSS Attack Vulnerability 3:  
  
REQUEST:  
http://[TARGET]/[FANAME-DIRECTORY]/page.php?name=<script>alert(document.cookies)</script>  
REPLY:  
will execute <script>alert(document.cookie)</script>.  
Credits:  
Jesper Jurcenoks  
Co-founder netVigilance, Inc  
www.netvigilance.com  
  
`

EPSS

0.002

Percentile

54.6%

Related for PACKETSTORM:67808