SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
BID:39526
Info
SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 39526 |
| Class: | Input Validation Error |
| CVE: |
CVE-2010-1710 CVE-2010-1711 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 16 2010 12:00AM |
| Updated: | Apr 13 2015 09:02PM |
| Credit: | Jose Luis Gongora Fernandez |
| Vulnerable: |
Ramon Castro Perez SIESTTA 2.0 |
| Not Vulnerable: | |
Discussion
SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
SIESTTA is prone to a local file-include vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute local files within the context of the webserver process. Information harvested may aid in further attacks.
The attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
SIESTTA 2.0 is affected; other versions may also be vulnerable.
SIESTTA is prone to a local file-include vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute local files within the context of the webserver process. Information harvested may aid in further attacks.
The attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
SIESTTA 2.0 is affected; other versions may also be vulnerable.
Exploit / POC
SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
Attackers can exploit these issues via a browser. To exploit a cross-site scripting issue, attackers must entice an unsuspecting user to follow a malicious URI.
The following example URIs are available:
Attackers can exploit these issues via a browser. To exploit a cross-site scripting issue, attackers must entice an unsuspecting user to follow a malicious URI.
The following example URIs are available:
Solution / Fix
SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of any more recent information, please mail us at: [email protected].
References
SIESTTA Local File Include and Cross Site Scripting Vulnerabilities
References:
References:
- Ramon Castro Perez - Homepage (Ramon Castro Perez)
- SIESTTA (old) - Homepage (Ramon Castro Perez)