exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

0012.txt

0012.txt
Posted Jul 20, 2006
Authored by Moritz Naumann | Site moritz-naumann.com

WebScarab is subject to a client side script code injection vulnerability which may allow for cross site scripting attacks against web clients connecting through it.

tags | advisory, web, xss
SHA-256 | 8743267c238efa13f343583cfea9be6705e16a81ff5da7e32ea95f11aca43cd7

0012.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



SA0012

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++ WebScarab Cross Site Scripting +++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


PUBLISHED ON
Jul 18, 2006


PUBLISHED AT
http://moritz-naumann.com/adv/0012/webscarabxss/0012.txt
http://moritz-naumann.com/adv/0012/webscarabxss/0012.txt.gpg


PUBLISHED BY
Moritz Naumann IT Consulting & Services
Hamburg, Germany
http://moritz-naumann.com/

SECURITY at MORITZ hyphon NAUMANN d0t COM
GPG key: http://moritz-naumann.com/keys/0x277F060C.asc


AFFECTED APPLICATION OR SERVICE
WebScarab
http://www.owasp.org/index.php/OWASP_WebScarab_Project
http://sourceforge.net/projects/owasp/

WebScarab is a Free Software for manual and semi-automatic
web application penetration testing. It is developed in
Java by Rogan Dawes as part of the Open Web Application
Security Project (OWASP).


AFFECTED VERSIONS
Version 20060621-0003 and below


ISSUES
WebScarab is subject to a client side script code injection
vulnerability which may allows for running cross site
scripting attacks against web clients connecting through it.

+++++ 1. Cross Site Scripting vulnerability in error
messages

By accessing the following URI using a web browser which is
prone to this issue and configured to proxy through a
vulnerable version of WebScarab, a non-persitent web script
injection can be achieved:

http://arbitrary.domain/</pre><script>alert(0);</script>

This allows for disclosure of sensitive data stored in the
security context of any arbitrary domain which the web browser
has previously accessed but WebScarab is not able to access
by the time the attack takes place (due to invalid upstream
proxy setting on WebScarab, different results of DNS queries,
limited connectivity or other reasons).

Ms Internet Explorer 6 SP2 and Konqueror 3.5.3 are known to
be prone to this issue. This problem is caused by insufficient
santitation of user supplied input before it is returned to
the client as part of an error message.


BACKGROUND
Cross Site Scripting (XSS):
Cross Site Scripting, also known as XSS or CSS, describes
the injection of malicious content into output produced
by a web application. A common attack vector is the
inclusion of arbitrary client side script code into the
applications' output. Failure to completely sanitize user
input from malicious content can cause a web application
to be vulnerable to Cross Site Scripting.

http://en.wikipedia.org/wiki/XSS
http://www.cgisecurity.net/articles/xss-faq.shtml


WORKAROUNDS
Client: Disable Javascript.
Server: None known.


SOLUTIONS
Rogan Dawes has released version 20060718-1904 today.
This version fixes this issue. The updated packages is
available at

http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=61823


TIMELINE
Jul 18, 2006: Discovery, code maintainer notification
Jul 18, 2006: Code maintainer provides fix
Jul 18, 2006: Public advisory


REFERENCES
N/A


ADDITIONAL CREDIT
N/A


LICENSE
Creative Commons Attribution-ShareAlike License Germany
http://creativecommons.org/licenses/by-sa/2.0/de/



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEvVpon6GkvSd/BgwRArImAJ4wq5+KO9B8Lt/QT7gaCc+zDhAH0QCfe0pY
8lOADqs+qmKzqw0cgeb3HWU=
=32H+
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close