IBS 'username' Parameter Cross Site Scripting Vulnerability
BID:30270
Info
IBS 'username' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 30270 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 17 2008 12:00AM |
| Updated: | Jul 17 2008 11:28PM |
| Credit: | cyb3r @STF |
| Vulnerable: |
IBS IBS 0.15 |
| Not Vulnerable: | |
Discussion
IBS 'username' Parameter Cross Site Scripting Vulnerability
IBS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
IBS 0.15 is vulnerable; other versions may also be affected. The IBSng branch of the application is not vulnerable.
IBS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
IBS 0.15 is vulnerable; other versions may also be affected. The IBSng branch of the application is not vulnerable.
Exploit / POC
IBS 'username' Parameter Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
Solution / Fix
IBS 'username' Parameter Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].