Mapquest.com suffers from a cross site scripting vulnerability due to limited bounds checking.
ea94e58e0a0722208813acd950ff9cb083bb6fd92c16e590df7b75b0288efd5e
Title: Mapquest.com Cross-Site scripting vulnerability
Provided by: cm` cmthemc[at]yahoo.com
----------------
Mapquest.com is an online mapping system that provides both maps and driving directions to a location inputted by a user. Unfortunately their website suffers from a Cross Site scripting vulnerability that could allow an attacker to luer an unsuspecting victim into a javascript trap.
-----------------
Impact: Medium
-----------------
Analysis:
- By forming a carefully crafted URL a remote attacker has the ability to perform cross site scripting on the mapquest.com website. The main file mapquest uses to search is db for directions suffers from limited bounds checking while parsing a url that allows an attacker to enter in javascript and HTML code.
Example:
https://www.mapquest.com/directions/main.adp?go=1&do=nw&2ex=1&src=maps&ct=NA&1y=US&1a=%3Cscript%3Ealert%28%27please+contact+cmthemc@yahoo.com+for+any+further+info%27%29%3B%3C%2Fscript%3E&1p=&1c=gainesville&1s=fl&1z=&1ah=&2a=1+N+Main+St&2s=FL&2c=Gainesville&2ic=31&2ex=1&2g=cYqEnQwjKv4%253d&2y=US&2z=32601-5323&2l=%252fTDXcswSWqE%253d&lr=2&x=0&y=0
-----------------
Vendor Status:
-----------------
08/13/2003 - info@mapquest.com notified
08/15/2003 - Public Disclosure