lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 24 Aug 2005 13:25:06 +0200
From: GomoR <bugtraq@...or.org>
To: bugtraq@...urityfocus.com
Subject: Cross-site scripting vulnerability in BEA WebLogic administration console



I. DESCRIPTION

  A cross-site scripting issue affects the display of error events in the
  'View Error Log' feature of BEA WebLogic Administration console.

II. AFFECTED PRODUCTS

  BEA WebLogic 8.1 SP4 and previous.

III. HOW TO VERIFY

  1. Make a HTTP request containing XSS code to a target Web server

  $ printf \
  "GET /<script>alert(document.cookie)</script>GomoR HTTP/1.0\r\n\r\n" \
  | nc www.example.com 80

  2. Login into the Administration console
  3. Go to the menu 'Network configurations/servers/myserser/'
  4. Click on 'View server log'
  5. Search for the string GomoR and click on the BEA-id event.

  A JavaScript dialog box should appear.

IV. SEVERITY

  I let each customer evaluate that within their own context.

V. DISCLOSURE TIMELINE

  06/08/2005  Vendor alerted
  06/08/2005  First vendor response
  06/10/2005  Vendor confirmed the issue
  06/22/2005  Vendor gave temporary test patch
  08/15/2005  Vendor public advisory
  08/23/2005  GomoR public advisory

VI. REFERENCES

  BEA05-80.01
  http://dev2dev.bea.com/pub/advisory/135

  BEA WebLogic Server and WebLogic Express Multiple Remote Vulnerabilities
  http://www.securityfocus.com/bid/13717

-- 
  ^  ___  ___    FreeBSD Network - http://www.GomoR.org/ <-+
  | / __ |__/          Systems & Security Engineer         |
  | \__/ |  \     ---[ zsh$ alias psed='perl -pe ' ]---    |
  +-->  Net::Packet <=> http://search.cpan.org/~gomor/  <--+


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ