what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

EV0083.txt

EV0083.txt
Posted Mar 3, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

E-Blah Platinum is susceptible to cross site scripting via the use of HTTP_REFERER.

tags | exploit, xss
advisories | CVE-2006-0829
SHA-256 | 55babc2e2971ea8c2ef0b403d2867a558f33e305e565e64a60470a45507252f1

EV0083.txt

Change Mirror Download
New eVuln Advisory:
E-Blah Platinum 'Referer' XSS Vulnerability
http://evuln.com/vulns/83/summary.html

--------------------Summary----------------
eVuln ID: EV0083
CVE: CVE-2006-0829
Software: E-Blah Platinum
Sowtware's Web Site: http://www.eblah.com
Versions: 9.7
Critical Level: Moderate
Type: Cross-Site Scripting
Class: Remote
Status: Patched
Exploit: Available
Solution: Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

-----------------Description---------------
Vulnerable script: Code/Routines.pl

Environment variable 'HTTP_REFERER' isn't properly sanitized. This can be used to post HTTP query with fake Referer value which may contain arbitrary html or script code. This code will be executed when administrator will open "Click Log".

Administrator's login and password are threatened.


--------------Exploit----------------------
Available at: http://evuln.com/vulns/83/exploit.html

Example of HTTP Query:

GET /cgi-bin/Blah.pl HTTP/1.0
Host: [host]
Referer: [XSS]

--------------Solution---------------------
Vendor-provided patch is available here:

http://www.eblah.com/forum/m-1140116897/

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Regards,
Aliaksandr Hartsuyeu
http://evuln.com - Penetration Testing Services
.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close