OKBSYS Lite 1.0 "search.asp" XSS vuln.

Type securityvulns
Reporter Securityvulns
Modified 2005-11-25T00:00:00


Online Knowledge Base System: Lite Edition 1.0 XSS vuln. Vuln. dicovered by : r0t Date: 25 nov. 2005 Orginal advisory:http://pridels.blogspot.com/2005/11/okbsys-lite-10-searchasp-xss-vuln.html Vendor:www.onlinetechtools.com Product link:http://www.onlinetechtools.com/products/okbsys/ affected vesion: 1.0 and prior

Vuln. Description: Input passed to the "q" parameter in "search.asp" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

example: /search.asp?q=%3Cscript%3Ealert%28%27r0t%27%29%3C%2Fscript%3E&c=&a.x=21&a.y=11

Solution: Edit the source code to ensure that input is properly sanitised.