exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

major_rls52.txt

major_rls52.txt
Posted May 13, 2008
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Actual Analyzer Server versions 8.37 and below, Gold versions 7.74 and below, Pro versions 6.95 and below, and Lite versions 2.78 and below all suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a236e45954620e03c7969f31851a500f7964ee892b3f6b2110a0d270a4a2e21b

major_rls52.txt

Change Mirror Download
[MajorSecurity Advisory #52]ActualAnalyzer family - Cross Site Scripting Issues

Details
=======
Product: Actual Analyzer
Security-Risk: moderated
Remote-Exploit: yes
Vendor-URL: http://www.actualscripts.com
Vendor-Status: informed
Advisory-Status: published

Credits
============
Discovered by: David Vieira-Kurz
http://www.majorsecurity.de

Affected Products:
----------------------------
ActualAnalyzer Server 8.37 and prior
ActualAnalyzer Gold 7.74 and prior
ActualAnalyzer Pro 6.95 and prior
Actual Analyzer Lite 2.78 and prior

Original Advisory:
============
http://www.majorsecurity.de/index_2.php?major_rls=major_rls52

Introduction
============
ActualAnalyzer is a powerful statistics-gathering and analysis tool for monitoring web site traffic.
It is equally effective for sites with low and high volumes of traffic
and provides a wealth of comparative and analytical information.

More Details
============
Cross Site Scripting:
Input passed directly to the "language" parameter in "view.php" is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

PoC:
=============
/view.php?&language=>"><script>alert(15031988)</script>

Solution
=============
Edit the source code to ensure that input is properly sanitised.
You should work with "htmlspecialchars()" or "htmlentities()" php-function to ensure that html tags
and javascript code are not going to be executed.

Example:
<?php
$pass = htmlentities($_POST['pass']);
$test = htmlspecialchars($_GET('test'));
?>

History/Timeline
================
05.05.2008 discovery of the vulnerabilities
05.05.2008 additional tests with other versions
07.05.2008 contacted the vendor
12.05.2008 advisory is written
13.05.2008 advisory released

MajorSecurity
================
MajorSecurity is a German pentest and security research project which focuses
on web application security.
You can find more Information on the MajorSecurity Project at
http://www.majorsecurity.de/pentest.php
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close