Netscape.com - Cross site scripting vulnerability ---------------------------------------------- Type: Cross site scripting Date: June, 13th 2006 ---------------------------------------------- Credits: ---------------------------------------------- Discovered by: David "Aesthetico" Vieira-Kurz http://www.majorsecurity.de ---------------------------------------------- Affected pages: ---------------------------------------------- 1. http://netscape.com 2. http://search.netscape.com 3. http://channels.netscape.com Vulnerability: ---------------------------------------------- I found a bug in the search boxes of the Netscape Network. If you type in a "searchword" into the searchbox of "http://netscape.com" or "http://channels.netscape.com" you'll be automaticly redirected to "http://search.netscape.com" and you'll see the results of your search. Input passed to the "query" parameter in "search?"-file is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Sending a malicious code will result a code working on the page that pops up... http://search.netscape.com/ns/search?query= Example: ---------------------------------------------- http://search.netscape.com/ns/search?query= Screenshots: ---------------------------------------------- http://majorsecurity.de/advisory/netscape_bug/netscape1.JPG http://majorsecurity.de/advisory/netscape_bug/netscape2.JPG http://majorsecurity.de/advisory/netscape_bug/netscape3.JPG