mailing list archives
WebScarab <= 20060621-0003 cross site scripting
From: security () moritz-naumann com
Date: Wed, 19 Jul 2006 00:02:16 +0200
-----BEGIN PGP SIGNED MESSAGE-----
+++++ WebScarab Cross Site Scripting +++++
Jul 18, 2006
Moritz Naumann IT Consulting & Services
SECURITY at MORITZ hyphon NAUMANN d0t COM
GPG key: http://moritz-naumann.com/keys/0x277F060C.asc
AFFECTED APPLICATION OR SERVICE
WebScarab is a Free Software for manual and semi-automatic
web application penetration testing. It is developed in
Java by Rogan Dawes as part of the Open Web Application
Security Project (OWASP).
Version 20060621-0003 and below
WebScarab is subject to a client side script code injection
vulnerability which may allows for running cross site
scripting attacks against web clients connecting through it.
+++++ 1. Cross Site Scripting vulnerability in error
By accessing the following URI using a web browser which is
prone to this issue and configured to proxy through a
vulnerable version of WebScarab, a non-persitent web script
injection can be achieved:
This allows for disclosure of sensitive data stored in the
security context of any arbitrary domain which the web browser
has previously accessed but WebScarab is not able to access
by the time the attack takes place (due to invalid upstream
proxy setting on WebScarab, different results of DNS queries,
limited connectivity or other reasons).
Ms Internet Explorer 6 SP2 and Konqueror 3.5.3 are known to
be prone to this issue. This problem is caused by insufficient
santitation of user supplied input before it is returned to
the client as part of an error message.
Cross Site Scripting (XSS):
Cross Site Scripting, also known as XSS or CSS, describes
the injection of malicious content into output produced
by a web application. A common attack vector is the
inclusion of arbitrary client side script code into the
applications' output. Failure to completely sanitize user
input from malicious content can cause a web application
to be vulnerable to Cross Site Scripting.
Server: None known.
Rogan Dawes has released version 20060718-1904 today.
This version fixes this issue. The updated packages is
Jul 18, 2006: Discovery, code maintainer notification
Jul 18, 2006: Code maintainer provides fix
Jul 18, 2006: Public advisory
Creative Commons Attribution-ShareAlike License Germany
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
-----END PGP SIGNATURE-----
- WebScarab <= 20060621-0003 cross site scripting security (Jul 18)