Title: ====== WhiteHouse Gov Service - Persistent Web Vulnerability Date: ===== 2011-11-04 References: =========== http://www.vulnerability-lab.com/get_content.php?id=308 VL-ID: ===== 308 Introduction: ============= http://www.whitehouse.gov/ Abstract: ========= The vulnerability-lab researcher (F0x23 & Rem0ve) discovered a persistent script code injection vulnerability on the WhiteHouse Gov website. Report-Timeline: ================ 2011-11-01: Vendor Notification 2011-11-03: Vendor Response/Feedback 2011-11-04: Vendor Fix/Patch 2011-11-04: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== A persistent script code injection vulnerability is detected on the WhiteHouse Gov website. The vulnerability allows remote attackers to implement/inject own malicious script code (persistent) on a web service main module of the website. The successful exploitation of the vulnerability results in hijacking of user-,admin- or -backend sessions, manipulation of profile content, redirect to external malicious targets(websites), defacement & can lead to malware infiltration via petition. Vulnerable Module(s): [+] Profil - Location Input Affected Module(s): [+] Petition - Add, Share & Sign Picture(s): ../1.png Proof of Concept: ================= The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ... PoC:
creator
Bernd N
"'>
October 31, 2011
Signature # 1
Reference: https://wwws.whitehouse.gov/petitions/!/petition/hey/VLsNrtR1 INPUT FORM: City: