WebScarab is subject to a client side script code injection vulnerability which may allow for cross site scripting attacks against web clients connecting through it.
8743267c238efa13f343583cfea9be6705e16a81ff5da7e32ea95f11aca43cd7
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SA0012
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++ WebScarab Cross Site Scripting +++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
PUBLISHED ON
Jul 18, 2006
PUBLISHED AT
https://moritz-naumann.com/adv/0012/webscarabxss/0012.txt
https://moritz-naumann.com/adv/0012/webscarabxss/0012.txt.gpg
PUBLISHED BY
Moritz Naumann IT Consulting & Services
Hamburg, Germany
https://moritz-naumann.com/
SECURITY at MORITZ hyphon NAUMANN d0t COM
GPG key: https://moritz-naumann.com/keys/0x277F060C.asc
AFFECTED APPLICATION OR SERVICE
WebScarab
https://www.owasp.org/index.php/OWASP_WebScarab_Project
https://sourceforge.net/projects/owasp/
WebScarab is a Free Software for manual and semi-automatic
web application penetration testing. It is developed in
Java by Rogan Dawes as part of the Open Web Application
Security Project (OWASP).
AFFECTED VERSIONS
Version 20060621-0003 and below
ISSUES
WebScarab is subject to a client side script code injection
vulnerability which may allows for running cross site
scripting attacks against web clients connecting through it.
+++++ 1. Cross Site Scripting vulnerability in error
messages
By accessing the following URI using a web browser which is
prone to this issue and configured to proxy through a
vulnerable version of WebScarab, a non-persitent web script
injection can be achieved:
https://arbitrary.domain/</pre><script>alert(0);</script>
This allows for disclosure of sensitive data stored in the
security context of any arbitrary domain which the web browser
has previously accessed but WebScarab is not able to access
by the time the attack takes place (due to invalid upstream
proxy setting on WebScarab, different results of DNS queries,
limited connectivity or other reasons).
Ms Internet Explorer 6 SP2 and Konqueror 3.5.3 are known to
be prone to this issue. This problem is caused by insufficient
santitation of user supplied input before it is returned to
the client as part of an error message.
BACKGROUND
Cross Site Scripting (XSS):
Cross Site Scripting, also known as XSS or CSS, describes
the injection of malicious content into output produced
by a web application. A common attack vector is the
inclusion of arbitrary client side script code into the
applications' output. Failure to completely sanitize user
input from malicious content can cause a web application
to be vulnerable to Cross Site Scripting.
https://en.wikipedia.org/wiki/XSS
https://www.cgisecurity.net/articles/xss-faq.shtml
WORKAROUNDS
Client: Disable Javascript.
Server: None known.
SOLUTIONS
Rogan Dawes has released version 20060718-1904 today.
This version fixes this issue. The updated packages is
available at
https://sourceforge.net/project/showfiles.php?group_id=64424&package_id=61823
TIMELINE
Jul 18, 2006: Discovery, code maintainer notification
Jul 18, 2006: Code maintainer provides fix
Jul 18, 2006: Public advisory
REFERENCES
N/A
ADDITIONAL CREDIT
N/A
LICENSE
Creative Commons Attribution-ShareAlike License Germany
https://creativecommons.org/licenses/by-sa/2.0/de/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEvVpon6GkvSd/BgwRArImAJ4wq5+KO9B8Lt/QT7gaCc+zDhAH0QCfe0pY
8lOADqs+qmKzqw0cgeb3HWU=
=32H+
-----END PGP SIGNATURE-----