Lucene search

K
zeroscienceGjoko KrsticZSL-2012-5072
HistoryFeb 17, 2012 - 12:00 a.m.

WampServer <= 2.2c (lang) Remote Cross-Site Scripting Vulnerability

2012-02-1700:00:00
Gjoko Krstic
zeroscience.mk
18

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

High

EPSS

0.007

Percentile

80.9%

Title: WampServer <= 2.2c (lang) Remote Cross-Site Scripting Vulnerability
Advisory ID: ZSL-2012-5072
Type: Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 17.02.2012

Summary

WampServer is a Windows web development environment. It allows you to create web applications with Apache2, PHP and a MySQL database.

Description

WampServer is vulnerable to cross-site scripting vulnerability. This issue is due to the application’s failure to properly sanitize user-supplied input thru the ‘lang’ parameter (GET) in index.php script. An attacker may leverage any of the cross-site scripting issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials, phishing as well as other attacks.

--------------------------------------------------------------------------------

` /index.php:

265: if (isset ($_GET[‘lang’]))
266: {
267: $langue = $_GET[‘lang’];
268: }
`
--------------------------------------------------------------------------------

Vendor

Alter Way - <http://www.wampserver.com>

Affected Version

<= 2.2c (32/64bit)

Tested On

Microsoft Windows XP Professional SP3 (EN) 32bit
Microsoft Windows 7 Ultimate SP1 (EN) 64bit

Vendor Status

[13.02.2012] Vulnerability discovered.
[16.02.2012] Vendor notified of the vulnerability.
[17.02.2012] Public security advisory released.
[20.02.2012] Vendor releases version 2.2d.

PoC

wampserver_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php&gt;
[2] <http://packetstormsecurity.org/files/109857&gt;
[3] <http://www.securityfocus.com/bid/52054&gt;
[4] <http://cxsecurity.com/issue/WLB-2012020150&gt;
[5] <http://xforce.iss.net/xforce/xfdb/56417&gt;

Changelog

[17.02.2012] - Initial release
[18.02.2012] - Added reference [4]
[21.02.2012] - Added reference [5]
[07.03.2012] - Added vendor status.

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>WampServer &lt;= 2.2c (lang) Remote Cross-Site Scripting Vulnerability


Vendor: Alter Way
Product web page: http://www.wampserver.com
Affected version: &lt;= 2.2c (32/64bit)

Summary: WampServer is a Windows web development environment.
It allows you to create web applications with Apache2, PHP and
a MySQL database.

Desc: WampServer is vulnerable to cross-site scripting vulnerability.
This issue is due to the application's failure to properly sanitize
user-supplied input thru the 'lang' parameter (GET) in index.php script.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user in
the context of the affected site. This may facilitate the theft of cookie-based
authentication credentials, phishing as well as other attacks.


=================================================================
/index.php:
-----------
265: if (isset ($_GET['lang']))
266: {
267:     $langue = $_GET['lang'];
268: }

=================================================================


Tested on: Microsoft Windows XP Professional SP3 (EN) 32bit
           Microsoft Windows 7 Ultimate SP1 (EN) 64bit


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Vendor status:

[13.02.2012] Vulnerability discovered.
[16.02.2012] Vendor notified of the vulnerability.
[17.02.2012] Public security advisory released.


Advisory ID: ZSL-2012-5072
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5072.php

Related Advisory ID: ZSL-2010-4926
Related Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php

CVE-2010-0700: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0700
CWE-79: http://cwe.mitre.org/data/definitions/79.html



13.02.2012

---

Dork:

	"intext:WampServer - Donate - Alter Way"
	"intitle:WAMPSERVER Homepage"


PoC:

        http://localhost/?lang="&gt;<script>alert('zsl')</script>
        http://localhost/index.php?lang="&gt;<script>alert('zsl')</script>
</p></body></html>

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

High

EPSS

0.007

Percentile

80.9%