Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12325
HistoryApr 20, 2006 - 12:00 a.m.

Portal Pack 6 XSS vuln.

2006-04-2000:00:00
vulners.com
9

Portal Pack 6 XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 20 april 2006
vendor:www.kcscripts.com/scripts/portal-pack.htm
affected versions:6.0 and prior
orginal advisoy:
http://pridels.blogspot.com/2006/04/portal-pack-6-xss-vuln.html
###############################################

Vuln. Description:

Portal Pack contains a flaws that allows a remote cross site scripting
attacks.
Those flaws exists because input passed to "sort_order" parameter in
"calendar/Visitor.cgi" and "news/NsVisitor.cgi" and input passed to"q"
parameter in "search/search.cgi" and input passed to "cat_id" parameter in
"classifieds/viewcat.cgi" isn't properly sanitised before being returned to
the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/cgi-bin/calendar/Visitor.cgi?job=view_event&eventNo=
0&sort_order=[XSS]

/cgi-bin/news/NsVisitor.cgi?job=view_article&articleNo=
0&sort_order=[XSS]

/cgi-bin/search/search.cgi?q=[XSS]

/cgi-bin/classifieds/viewcat.cgi?cat_id=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/