what you don't know can hurt you

JAMWiki 1.1.4 Cross Site Scripting

JAMWiki 1.1.4 Cross Site Scripting
Posted Mar 30, 2012
Authored by Sooraj K.S | Site secpod.com

JAMWiki version 1.1.4 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | c41d9e87bff147429447751bc99e93e3

JAMWiki 1.1.4 Cross Site Scripting

Change Mirror Download
##############################################################################
#
# Title : JAMWiki 'num' Parameter Cross Site Scripting Vulnerability
# Author : Sooraj K.S SecPod Technologies (www.secpod.com)
# Vendor : http://jamwiki.org/wiki/en/JAMWiki
# Advisory : http://secpod.org/blog/?p=493
# http://secpod.org/advisories/SecPod_JamWiki_XSS_Vuln.txt
# Software : JAMWiki 1.1.4
# Date : 30/03/2012
#
###############################################################################

SecPod ID: 1036 13/12/2011 Issue Discovered
21/02/2012 Vendor Notified
21/02/2012 Vendor Acknowledge
13/03/2012 Issue Resolved

Class: Cross-Site Scripting Severity: Medium


Overview:
---------
JAMWiki is prone to cross-site scripting vulnerability.


Technical Description:
----------------------
JAMWiki: Java-based Wiki engine is prone to a cross-site scripting
vulnerability because it fails to properly sanitize user-supplied input.

Input passed via the 'num' parameter in Special:AllPages is not properly
verified before it is returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in the context of
a vulnerable site. This may allow the attacker to steal cookie-based
authentication credentials and to launch other attacks.

The vulnerability has been tested in JAMWiki 1.1.3 and 1.14. Other versions may
also be affected.


Impact:
--------
Successful exploitation allows an attacker to execute arbitrary HTML and script
code in a user's browser session in the context of a vulnerable site.


Affected Software:
------------------
JAMWiki 1.1.4 and prior.


Reference:
---------
http://secpod.org/blog/?p=493
http://jamwiki.org/wiki/en/JAMWiki
http://jira.jamwiki.org/browse/JAMWIKI-76
http://secpod.org/advisories/SecPod_JamWiki_XSS_Vuln.txt


Proof of Concept:
-----------------
http://www.example.com/jamwiki/en/Special:AllPages?num="<script>alert(document.cookie)</script>


Solution:
----------
Upgrade to JAMWiki 1.1.6


Risk Factor:
-------------
CVSS Score Report:
ACCESS_VECTOR = NETWORK
ACCESS_COMPLEXITY = MEDIUM
AUTHENTICATION = NOT_REQUIRED
CONFIDENTIALITY_IMPACT = NONE
INTEGRITY_IMPACT = PARTIAL
AVAILABILITY_IMPACT = NONE
EXPLOITABILITY = PROOF_OF_CONCEPT
REMEDIATION_LEVEL = OFFICIAL_FIX
REPORT_CONFIDENCE = CONFIRMED
CVSS Base Score = 4.3 (AV:N/AC:M/Au:NR/C:N/I:P/A:N)
Risk factor = Medium


Credits:
--------
Sooraj K.S of SecPod Technologies has been credited with the discovery of this
vulnerability.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close