exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

cherokee-0.5.0.txt

cherokee-0.5.0.txt
Posted Apr 12, 2006
Authored by Ruben Garrote Garcia

Cherokee webserver versions less than 0.5.1 allows for XSS in its 400 error message.

tags | advisory
SHA-256 | 55528cc9c26fc9ce6d1a8967aae662bf9b9a6b83bec1825bc5c99957c840c8e9

cherokee-0.5.0.txt

Change Mirror Download
Tuesday 4 of April of 2006, I have detected that it is possible to mount an attack of the type Cross Site Scripting (XSS) in cherokee-0.5.0 and all previous versions.

The problem resides, when introducing code HTML in the URL. Because previously, it was let now of a seemed failure, from version 0.4.8 filter the characters < > when an error 404 happens. But if cherokee does not understand the request (Error 400) gives back the string introduced by the user, without no modification, allowing that can be injected I code HTML, to the client.

Proofs of concepts: http://localhost:80<script>alert("XSS_Discovered_by_Ruben_Garrote_Garcia_4_Mar_2006");</script> http://localhost/..<script>alert("XSS_Discovered_by_Ruben_Garrote_Garcia_4_Mar_2006");<script>

Version not vulnerable: cherokee-0.5.1
Web Cherokee: www.0x50.org

Credits:
Ruben Garrote Garcia
rubengarrote@idominiun.com
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close