what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

0012.txt

0012.txt
Posted Jul 20, 2006
Authored by Moritz Naumann | Site moritz-naumann.com

WebScarab is subject to a client side script code injection vulnerability which may allow for cross site scripting attacks against web clients connecting through it.

tags | advisory, web, xss
SHA-256 | 8743267c238efa13f343583cfea9be6705e16a81ff5da7e32ea95f11aca43cd7

0012.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



SA0012

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++ WebScarab Cross Site Scripting +++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


PUBLISHED ON
Jul 18, 2006


PUBLISHED AT
https://moritz-naumann.com/adv/0012/webscarabxss/0012.txt
https://moritz-naumann.com/adv/0012/webscarabxss/0012.txt.gpg


PUBLISHED BY
Moritz Naumann IT Consulting & Services
Hamburg, Germany
https://moritz-naumann.com/

SECURITY at MORITZ hyphon NAUMANN d0t COM
GPG key: https://moritz-naumann.com/keys/0x277F060C.asc


AFFECTED APPLICATION OR SERVICE
WebScarab
https://www.owasp.org/index.php/OWASP_WebScarab_Project
https://sourceforge.net/projects/owasp/

WebScarab is a Free Software for manual and semi-automatic
web application penetration testing. It is developed in
Java by Rogan Dawes as part of the Open Web Application
Security Project (OWASP).


AFFECTED VERSIONS
Version 20060621-0003 and below


ISSUES
WebScarab is subject to a client side script code injection
vulnerability which may allows for running cross site
scripting attacks against web clients connecting through it.

+++++ 1. Cross Site Scripting vulnerability in error
messages

By accessing the following URI using a web browser which is
prone to this issue and configured to proxy through a
vulnerable version of WebScarab, a non-persitent web script
injection can be achieved:

https://arbitrary.domain/</pre><script>alert(0);</script>

This allows for disclosure of sensitive data stored in the
security context of any arbitrary domain which the web browser
has previously accessed but WebScarab is not able to access
by the time the attack takes place (due to invalid upstream
proxy setting on WebScarab, different results of DNS queries,
limited connectivity or other reasons).

Ms Internet Explorer 6 SP2 and Konqueror 3.5.3 are known to
be prone to this issue. This problem is caused by insufficient
santitation of user supplied input before it is returned to
the client as part of an error message.


BACKGROUND
Cross Site Scripting (XSS):
Cross Site Scripting, also known as XSS or CSS, describes
the injection of malicious content into output produced
by a web application. A common attack vector is the
inclusion of arbitrary client side script code into the
applications' output. Failure to completely sanitize user
input from malicious content can cause a web application
to be vulnerable to Cross Site Scripting.

https://en.wikipedia.org/wiki/XSS
https://www.cgisecurity.net/articles/xss-faq.shtml


WORKAROUNDS
Client: Disable Javascript.
Server: None known.


SOLUTIONS
Rogan Dawes has released version 20060718-1904 today.
This version fixes this issue. The updated packages is
available at

https://sourceforge.net/project/showfiles.php?group_id=64424&package_id=61823


TIMELINE
Jul 18, 2006: Discovery, code maintainer notification
Jul 18, 2006: Code maintainer provides fix
Jul 18, 2006: Public advisory


REFERENCES
N/A


ADDITIONAL CREDIT
N/A


LICENSE
Creative Commons Attribution-ShareAlike License Germany
https://creativecommons.org/licenses/by-sa/2.0/de/



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEvVpon6GkvSd/BgwRArImAJ4wq5+KO9B8Lt/QT7gaCc+zDhAH0QCfe0pY
8lOADqs+qmKzqw0cgeb3HWU=
=32H+
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close