B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
BID:21334
Info
B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 21334 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Nov 16 2006 12:00AM |
| Updated: | Nov 29 2006 10:19PM |
| Credit: | lotto fischer is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
b2evolution b2evolution 1.8.2 b2evolution b2evolution 1.9 |
| Not Vulnerable: | |
Discussion
B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
The b2evolution application is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker to steal cookie-based authentication credentials and to launch other attacks.
This issue affects b2evolution versions 1.8.2 to 1.9 beta.
The b2evolution application is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker to steal cookie-based authentication credentials and to launch other attacks.
This issue affects b2evolution versions 1.8.2 to 1.9 beta.
Exploit / POC
B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
Attackers can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_404_not_found.page.php?baseurl=[XSS]&app_name=[XSS]
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_410_stats_gone.page.php?app_name=[XSS]
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_referer_spam.page.php?ReqURI=[XSS]&app_name=[XSS]
Attackers can exploit these issues via a web client.
The following proof-of-concept URIs are available:
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_404_not_found.page.php?baseurl=[XSS]&app_name=[XSS]
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_410_stats_gone.page.php?app_name=[XSS]
http://<www.example.com>/<b2epath>/inc/VIEW/errors/_referer_spam.page.php?ReqURI=[XSS]&app_name=[XSS]
Solution / Fix
B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
Solution:
The vendor has released fixes for these issues. Please see the references for more information.
b2evolution b2evolution 1.9
b2evolution b2evolution 1.8.2
Solution:
The vendor has released fixes for these issues. Please see the references for more information.
b2evolution b2evolution 1.9
-
b2evolution inc/VIEW/errors/_404_not_found.page.php - revision 1.8
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_404_not_found.page.php -
b2evolution inc/VIEW/errors/_410_stats_gone.page.php - revision 1.5
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_410_stats_gone.page.php -
b2evolution inc/VIEW/errors/_referer_spam.page.php - revision 1.7
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_referer_spam.page.php
b2evolution b2evolution 1.8.2
-
b2evolution inc/VIEW/errors/_404_not_found.page.php - revision 1.8
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_404_not_found.page.php -
b2evolution inc/VIEW/errors/_410_stats_gone.page.php - revision 1.5
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_410_stats_gone.page.php -
b2evolution inc/VIEW/errors/_referer_spam.page.php - revision 1.7
http://evocms.cvs.sourceforge.net/*checkout*/evocms/b2evolution/blogs/ inc/VIEW/errors/_referer_spam.page.php
References
B2Evolution Error Pages Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- b2evolution Homepage (b2evolution)
- CVS Repository (b2evolution)
- b2evolution XSS Vulnerabilities ([email protected] )