Lucene search

K

WampServer <= 2.2c (lang) Remote Cross-Site Scripting Vulnerability

🗓️ 17 Feb 2012 00:00:00Reported by Gjoko KrsticType 
zeroscience
 zeroscience
🔗 zeroscience.mk👁 20 Views

WampServer 2.2c lang Remote Cross-Site Scripting Vulnerabilit

Show more
Related
Code
ReporterTitlePublishedViews
Family
Packet Storm
WampServer 2.2c Cross Site Scripting
17 Feb 201200:00
packetstorm
CVE
CVE-2010-0700
23 Feb 201020:30
cve
Prion
Cross site scripting
23 Feb 201020:30
prion
NVD
CVE-2010-0700
23 Feb 201020:30
nvd
Cvelist
CVE-2010-0700
23 Feb 201020:00
cvelist
OpenVAS
WampServer <= 2.0i 'lang' Parameter XSS Vulnerability
5 Mar 201000:00
openvas
Zero Science Lab
WampServer 2.0i (index.php) Remote Cross Site Scripting Vulnerability
22 Feb 201000:00
zeroscience
<html><body><p>WampServer &lt;= 2.2c (lang) Remote Cross-Site Scripting Vulnerability


Vendor: Alter Way
Product web page: http://www.wampserver.com
Affected version: &lt;= 2.2c (32/64bit)

Summary: WampServer is a Windows web development environment.
It allows you to create web applications with Apache2, PHP and
a MySQL database.

Desc: WampServer is vulnerable to cross-site scripting vulnerability.
This issue is due to the application's failure to properly sanitize
user-supplied input thru the 'lang' parameter (GET) in index.php script.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user in
the context of the affected site. This may facilitate the theft of cookie-based
authentication credentials, phishing as well as other attacks.


=================================================================
/index.php:
-----------
265: if (isset ($_GET['lang']))
266: {
267:     $langue = $_GET['lang'];
268: }

=================================================================


Tested on: Microsoft Windows XP Professional SP3 (EN) 32bit
           Microsoft Windows 7 Ultimate SP1 (EN) 64bit


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Vendor status:

[13.02.2012] Vulnerability discovered.
[16.02.2012] Vendor notified of the vulnerability.
[17.02.2012] Public security advisory released.


Advisory ID: ZSL-2012-5072
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5072.php

Related Advisory ID: ZSL-2010-4926
Related Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php

CVE-2010-0700: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0700
CWE-79: http://cwe.mitre.org/data/definitions/79.html



13.02.2012

---

Dork:

	"intext:WampServer - Donate - Alter Way"
	"intitle:WAMPSERVER Homepage"


PoC:

        http://localhost/?lang="&gt;<script>alert('zsl')</script>
        http://localhost/index.php?lang="&gt;<script>alert('zsl')</script>
</p></body></html>

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Feb 2012 00:00Current
6.1Medium risk
Vulners AI Score6.1
CVSS24.3
EPSS0.00651
20
.json
Report