lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+ms+uL1p=4n7G1KMfPG+2B3Wjv0cBdd1cJMQKcXiLofPp5xFw@mail.gmail.com>
Date: Sat, 30 Jan 2016 16:26:02 -0600
From: Russell Butturini <tcstool@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Equibase.com HTML Injection/Possible Reflected XSS

Vulnerability Type:
HTML Injection (Possible XSS)

Title:
Equibase.com HTML Injection

Site Description:

Equibase.com is the official source for horse racing results, mobile
racing data, statistics as well as all other horse racing and
thoroughbred racing information.


Details:

The page http://www.equibase.com/profiles/results.cfm has a parameter
called type (e.g.
http://www.equibase.com/profiles/Results.cfm?type=Horse) that has a
limited set of valid values.  The input for this parameter is render
unmodified in the output. This allows for reflected HTML injection and
content spoofing such as:

http://www.equibase.com/profiles/Results.cfm?type=%3Ch1%3E%3Cb%3EAn%20error%20occured.%20%20Please%20visit%20www.badguysite.com%20and%20log%20in%20to%20your%20equibase%20account%20to%20continue.%3C/b%3E%3C/h1%3E


Various other HTML tags were accepted and rendered.  Some limited
filtering did appear to be in place for XSS mitigation, as basic XSS
attacks did not work.  Since this was not a sanctioned test by the
site owner, extensive reflected XSS testing in this parameter was not
tested but based on observation the filtering in place did not appear
to be sufficient to stop an advanced reflected XSS attack.

Vulnerability Severity:  Medium

Vendor Interaction:

Vendor notified on 1/17 with full report. No response received.

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ