---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: WebBatch Information Disclosure and Cross-Site Scripting SECUNIA ADVISORY ID: SA26889 VERIFY ADVISORY: http://secunia.com/advisories/26889/ CRITICAL: Less critical IMPACT: Cross Site Scripting, Exposure of sensitive information WHERE: >From remote SOFTWARE: WebBatch http://secunia.com/product/6082/ DESCRIPTION: Doz has reported a vulnerability and a security issue in WebBatch, which can be exploited by malicious people to disclose system information or conduct cross-site scripting attacks. 1) Input passed via the URL to webbatch.exe is not properly sanitised before being returned to a user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Version 2007D is not affected by this vulnerability. 2) Calling webbatch.exe with the "dumpinputdata" parameter can be exploited to disclose certain system information. SOLUTION: Filter malicious characters and character sequences using a proxy or a firewall. PROVIDED AND/OR DISCOVERED BY: Doz, hackerscenter.com ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------