SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
BID:52993
Info
SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 52993 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 12 2012 12:00AM |
| Updated: | Apr 12 2012 12:00AM |
| Credit: | Sony and Flexxpoint |
| Vulnerable: |
SchoolCenter SchoolCenter 11.0.27 |
| Not Vulnerable: | |
Discussion
SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
SchoolCenter is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
SchoolCenter 11.0.27 is vulnerable; other versions may also be affected.
SchoolCenter is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
SchoolCenter 11.0.27 is vulnerable; other versions may also be affected.
Exploit / POC
SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
An attacker can exploit the issue by enticing an unsuspecting user to visit a specially crafted URL.
The following example URI is available:
http://www.example.com/education/components/calendar/default.php?sectiondetailid=74&my_family=&d=4&m=4&y=2012&et=%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3Eday
An attacker can exploit the issue by enticing an unsuspecting user to visit a specially crafted URL.
The following example URI is available:
http://www.example.com/education/components/calendar/default.php?sectiondetailid=74&my_family=&d=4&m=4&y=2012&et=%27;alert%28String.fromCharCode%2888,83,83%29%29//\%27;alert%28String.fromCharCode%2888,83,83%29%29//%22;alert%28String.fromCharCode%2888,83,83%29%29//\%22;alert%28String.fromCharCode%2888,83,83%29%29//--%3E%3C/SCRIPT%3E%22%3E%27%3E%3CSCRIPT%3Ealert%28String.fromCharCode%2888,83,83%29%29%3C/SCRIPT%3Eday
Solution / Fix
SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
SchoolCenter 'et' Parameter Cross Site Scripting Vulnerability
References:
References:
- SchoolCenter Homepage (SchoolCenter)