Home page logo

bugtraq logo Bugtraq mailing list archives

Escapade Scripting Engine XSS Vulnerability and Path Disclosure
From: Bahaa Naamneh <b_naamneh () hotmail com>
Date: 9 Sep 2003 15:38:20 -0000

Escapade Scripting Engine XSS Vulnerability and Path Disclosure

Published: 9 September 2003

Released: 9 September 2003

Affected Systems: Escapade Scripting Engine

Vendor: http://www.escapade.org , http://www.squishedmosquito.com

Issue: Remote attackers can inject XSS script and know the path of the 

Escapade, or ESP for short, is a server-side scripting language that 
provides an interface to back-end database contents. Specifically 
designed to create dynamic information from this data, Escapade can be 
used to generate any kind of document - HTML, XML, text, and more. 
While server-side scripting is not a new concept, ESP is a breakthrough 
product that will enable programmers to much more easily have access to 
data in databases in their web pages without having to resort to ASP or 
complicated back-end Perl or PHP scripts. 

It's possibile to inject XSS script in the method variable. 



It's possible to make a malformed http request for many variables in 
Escapade and in doing so trigger an error. The resulting error message 
disclose potentially sensitive installation path information to the 
remote attacker. 


http://www.site.com/cgi-bin/esp?PAGE=! () #$%

The vendor has been contacted and a patch is not yet produced.

Filter the method variable (xss problem), filter all variables. 

Discovered by / credit:
Bahaa Naamneh
b_naamneh () hotmail com

  By Date           By Thread  

Current thread:
  • Escapade Scripting Engine XSS Vulnerability and Path Disclosure Bahaa Naamneh (Sep 09)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]