exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Webs ID Cross Site Scripting

Webs ID Cross Site Scripting
Posted Apr 16, 2015
Authored by Jing Wang

Webs ID suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | aaef7499cb1976d0bbee37571ec5fba3821d04da8aff958ec521f45274f8f211

Webs ID Cross Site Scripting

Change Mirror Download
*Webs ID Reflected XSS (Cross-site Scripting) Security Vulnerabilities*


Exploit Title: Webs ID /login.jsp &error Parameter Reflected XSS
(Cross-site Scripting) Security Vulnerabilities
Vendor: Webs, Inc
Product: Webs ID
Vulnerable Versions:
Tested Version:
Advisory Publication: April 02, 2015
Latest Update: April 02, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
Writer and Reporter: Wang Jing [Mathematics, Nanyang Technological
University (NTU), Singapore]







*Proposition Details:*


*(1) Vendor & Product Description:*


*Vendor:*
Webs, Inc



*Product & Vulnerable Versions:*
Webs ID



*Vendor URL & download:*
Webs ID can be obtained from here,
http://www.webs.com
http://www.webs.com/blog/2010/04/20/new-easier-way-to-manage-websid-account-settings/



*Terms of Service Overview:*
" The services offered by Webs, Inc. ("Webs" or "us" or "we" or "our")
include the websites at http://www.webs.com and http://www.freewebs.com as
well as any other related websites, toolbars, widgets, or other
distribution channels we may, from time to time, operate (collectively,
"Webs.com") and any other features, content, services or applications
offered, from time to time, by us (collectively, the "Services"). This
agreement (the "Terms of Service" or "Agreement") sets forth legally
binding terms for your use of the Services. By using the Services, you
agree to be bound by these Terms of Service, whether you are a "Website
Creator" (which means that you have registered to utilize our tools to
build a website ("Website")), a "Member" (which means that you have
registered on one of the Webs.com hosted Websites), a "Visitor" (which
means that you are visiting Webs.com or any hosted Website), or an
"Application Developer" (which means that you have been approved to build
or deploy your application or anything else that receives data (an
"Application") on Webs.com). The term "User" refers to a Visitor or a
Member or a Website Creator. By browsing or registering with, creating or
using any Website, Application or Service on Webs.com you are agreeing to
these Terms of Service, and these Terms of Service along with any other
guidelines we may post from time to time, such as our Privacy Policy and
Application Developer Terms (collectively, the "Guidelines") will govern
your use of the Services. If you do not agree to these Terms of Service or
any of the Guidelines, you must cease use of the Services."

"You represent that you are fully able and competent to enter into the
terms, conditions, obligations, representations and warranties set forth in
these Terms of Service. If you are using or creating a Website or
Application on or through Webs.com as a representative of a company or
legal entity, (i) you represent that you have the authority to enter into
this Agreement on behalf of that company or entity, and (ii) you agree that
the terms "you" and "your" in this Agreement refers to your company or
legal entity. "




*(2) Vulnerability Details:*
Webs ID web application has a security bug problem. It can be exploited by
XSS attacks. This may allow a remote attacker to create a specially crafted
request that would execute arbitrary script code in a user's browser
session within the trust relationship between their browser and the server.

Several other Webs ID products 0-day vulnerabilities have been found by
some other bug hunter researchers before. Webs has patched some of them.
Gmane (pronounced "mane") is an e-mail to news gateway. It allows users to
access electronic mailing lists as if they were Usenet newsgroups, and also
through a variety of web interfaces. Gmane is an archive; it never expires
messages (unless explicitly requested by users). Gmane also supports
importing list postings made prior to a list's inclusion on the service. It
has published suggestions, advisories, solutions related to XSS
vulnerabilities.


*(2.1) *The first code programming flaw occurs atoccurs at "/login.jsp?"
page with "&error" parameter.





*References:*
http://www.tetraph.com/security/xss-vulnerability/webs-id-reflected-xss/
http://securityrelated.blogspot.com/2015/04/webs-id-reflected-xss-cross-site.html
http://www.inzeed.com/kaleidoscope/computer-web-security/webs-id-reflected-xss/
http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/webs-id-reflected-xss/
https://computerpitch.wordpress.com/2015/04/15/webs-id-reflected-xss/
http://www.irist.ir/author-Wang%20Jing.html
http://exploitarchive.com/webshop-hun-1-062s-cross-site-scripting/
http://lists.openwall.net/full-disclosure/2015/02/03/2
http://permalink.gmane.org/gmane.comp.security.fulldisclosure/1821




--
Wang Jing,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU),
Singapore.
http://www.tetraph.com/wangjing/
https://twitter.com/justqdjing


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close