Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
BID:51276
Info
Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
| Bugtraq ID: | 51276 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-5025 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 05 2012 12:00AM |
| Updated: | Jan 05 2012 12:00AM |
| Credit: | Sitewatch |
| Vulnerable: |
Yaws Yaws 1.88 |
| Not Vulnerable: | |
Discussion
Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
Yaws is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are possible.
Yaws 1.88 is vulnerable; other versions may be affected.
Yaws is prone to multiple cross-site scripting and HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are possible.
Yaws 1.88 is vulnerable; other versions may be affected.
Exploit / POC
Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
An attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issues. An attacker can exploit the HTML-injection issues through a browser.
The following example URIs are available:
http://www.example.com/editTag.yaws?node=ALockedPage&tag=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/showOldPage.yaws?node=home&index=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/allRefsToMe.yaws?node=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/editPage.yaws?node=home
An attacker must trick an unsuspecting victim into following a malicious URI to exploit the cross-site scripting issues. An attacker can exploit the HTML-injection issues through a browser.
The following example URIs are available:
http://www.example.com/editTag.yaws?node=ALockedPage&tag=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/showOldPage.yaws?node=home&index=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/allRefsToMe.yaws?node=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E
http://www.example.com/editPage.yaws?node=home
Solution / Fix
Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Yaws Multiple Cross Site Scripting and HTML Injection Vulnerabilities
References:
References:
- Yaws Homepage (Yaws)
- Stored and Reflective XSS in Yaws-Wiki (Sitewatch)