what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

0004.txt

0004.txt
Posted Nov 10, 2005
Site moritz-naumann.com

Antville version 1.1 suffers from a cross site scripting flaw.

tags | exploit, xss
advisories | CVE-2005-3530
SHA-256 | 65a13345a6370cbd83ef8303e92c2f6af6db5ae09e9fa12c4473aa0ad5bf627d

0004.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



SA0004

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++ Antville 1.1 Cross Site Scripting +++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


PUBLISHED ON
Nov 09, 2005


PUBLISHED AT
http://moritz-naumann.com/adv/0004/antvxss/0004.txt
http://moritz-naumann.com/adv/0004/antvxss/0004.txt.sig


PUBLISHED BY
Moritz Naumann IT Consulting & Services
Hamburg, Germany
http://moritz-naumann.com/

info AT moritz HYPHON naumann D0T com
GPG key: http://moritz-naumann.com/keys/0x277F060C.asc


AFFECTED APPLICATION OR SERVICE
Antville
http://www.antville.org/


AFFECTED VERSION
Version 1.1
Possibly versions 1.0 and lower (untested)


BACKGROUND
Everybody knows XSS.
http://en.wikipedia.org/wiki/XSS
http://www.cgisecurity.net/articles/xss-faq.shtml


ISSUE
A XSS vulnerability has been detected in Antville. The
problem is caused by insufficient input sanitation.

By making a victim visit a specially crafted URL, it is
possible to inject client side scripting (such as
Javascript) and HTML which will be executed/rendered in
her browser.

The following URL demonstrates this issue:
[antville_basepath]/project/<script>alert('XSS');</script>

This may not be easily exploitable for cookie/session
stealing attacks due to the IP address lock on the session.


WORKAROUND
Client: Disable Javascript.
Server: Prevent access to the Antville installation.


SOLUTIONS
There does not seem to be a patch available. Our attempts
to contact the developers were unsuccessful.


TIMELINE
Sep 19, 2005 Discovery
Sep 19, 2005 Code maintainer notification
Sep 29, 2005 Another code maintainer notification
Nov 09, 2005 Public disclosure


REFERENCES
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3530


ADDITIONAL CREDIT
N/A


LICENSE
Creative Commons Attribution-ShareAlike License Germany
http://creativecommons.org/licenses/by-sa/2.0/de/



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDcikon6GkvSd/BgwRAvgIAJ9T6KB39w9Hk3OcJ56I+F6lLRoKWACfTR2c
dz7aukUAwcxTA5/q12mWrsA=
=QLOX
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close