[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070920033948.29363.qmail@securityfocus.com>
Date: 20 Sep 2007 03:39:48 -0000
From: DoZ@...kersCenter.com
To: bugtraq@...urityfocus.com
Subject: WebBatch Applications Cross Site Scripting Vulrnability
[HSC] WebBatch Applications Cross Site Scripting Vulrnability
This issue is due to a failure in the application to properly sanitize
user-supplied input. Attackers may exploit this issue via a web client. An
attacker may leverage this issue to have arbitrary script code execute in
the browser of an unsuspecting user in the context of the affected site.
This may help the attacker steal cookie-based authentication credentials
and launch other attacks.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz
Risk: Medium
Class: Input Validation Error
Remote: YES
Local: N/A
Platform: Windows Servers
Vendor: Wilson WindowWare, Inc
Product: WebBatch
http://winbatch.com/
Vulrnable Files:
webbatch.exe
* Attackers can exploit these issues via a web client.
Exploits:
/webcgi/webbatch.exe?XSS
/webcgi/webbatch.exe?PATH/XSS
Remote System Info Exposure:
/webcgi/webbatch.exe?dumpinputdata
Google Search: (webbatch.exe)
http://www.google.com/search?hl=en&q=ext%3Aexe+inurl%3A%28%7Cwebbatch%7C%29&btnG=Search
Only becoming a Ethical Hacker, you can stop a Hacker. Learn with out having
to pay thousands!- http://kit.hackerscenter.com - The most comprehensive security
pack you will ever find on the net!
Powered by blists - more mailing lists