WampServer 2.2c lang Remote Cross-Site Scripting Vulnerabilit
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | WampServer 2.2c Cross Site Scripting | 17 Feb 201200:00 | – | packetstorm |
![]() | CVE-2010-0700 | 23 Feb 201020:30 | – | cve |
![]() | Cross site scripting | 23 Feb 201020:30 | – | prion |
![]() | CVE-2010-0700 | 23 Feb 201020:30 | – | nvd |
![]() | CVE-2010-0700 | 23 Feb 201020:00 | – | cvelist |
![]() | WampServer <= 2.0i 'lang' Parameter XSS Vulnerability | 5 Mar 201000:00 | – | openvas |
![]() | WampServer 2.0i (index.php) Remote Cross Site Scripting Vulnerability | 22 Feb 201000:00 | – | zeroscience |
<html><body><p>WampServer <= 2.2c (lang) Remote Cross-Site Scripting Vulnerability
Vendor: Alter Way
Product web page: http://www.wampserver.com
Affected version: <= 2.2c (32/64bit)
Summary: WampServer is a Windows web development environment.
It allows you to create web applications with Apache2, PHP and
a MySQL database.
Desc: WampServer is vulnerable to cross-site scripting vulnerability.
This issue is due to the application's failure to properly sanitize
user-supplied input thru the 'lang' parameter (GET) in index.php script.
An attacker may leverage any of the cross-site scripting issues to have
arbitrary script code executed in the browser of an unsuspecting user in
the context of the affected site. This may facilitate the theft of cookie-based
authentication credentials, phishing as well as other attacks.
=================================================================
/index.php:
-----------
265: if (isset ($_GET['lang']))
266: {
267: $langue = $_GET['lang'];
268: }
=================================================================
Tested on: Microsoft Windows XP Professional SP3 (EN) 32bit
Microsoft Windows 7 Ultimate SP1 (EN) 64bit
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
@zeroscience
Vendor status:
[13.02.2012] Vulnerability discovered.
[16.02.2012] Vendor notified of the vulnerability.
[17.02.2012] Public security advisory released.
Advisory ID: ZSL-2012-5072
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2012-5072.php
Related Advisory ID: ZSL-2010-4926
Related Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4926.php
CVE-2010-0700: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0700
CWE-79: http://cwe.mitre.org/data/definitions/79.html
13.02.2012
---
Dork:
"intext:WampServer - Donate - Alter Way"
"intitle:WAMPSERVER Homepage"
PoC:
http://localhost/?lang="><script>alert('zsl')</script>
http://localhost/index.php?lang="><script>alert('zsl')</script>
</p></body></html>
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo