exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eGroupWareXSS.txt

eGroupWareXSS.txt
Posted Aug 24, 2004
Authored by Joxean Koret

eGroupWare version 1.0.0.003 is susceptible to a cross site scripting flaw.

tags | advisory, xss
SHA-256 | 2857363dac9c43f2774402925a849c4b3610100a22158155e0488e996121c3ff

eGroupWareXSS.txt

Change Mirror Download


---------------------------------------------------------------------------
Multiple Cross Site Scripting Vulnerabilities
in eGroupWare
---------------------------------------------------------------------------

Author: Joxean Koret
Date: 2004
Location: Basque Country

---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

eGroupWare Version 1.0.0.003

eGroupWare is a multi-user, web-based
groupware suite developed on a custom
set of PHP-based APIs. Currently available
modules include: email, addressbook,are so
equals.
calendar, infolog (notes, to-do's, phone calls),
content management, forum,
bookmarks, wiki

Web: http://www.egroupware.org

---------------------------------------------------------------------------

Vulnerabilities:
~~~~~~~~~~~~~~~~

A. Multiple Cross Site Scripting Vulnerabilities

I will no explicate certain bugs continuosly
because all the XSS vulnerabilities
are equals.

A1. In the calendar module the parameter "date"
is vulnerable to an XSS
vulnerability. The error is due to an incorrect
sanitization of the "date"
parameter. To try the vulnerability :

http://<site-with-egroupware>/egroupware/index.php?menuaction=calendar.uicalendar.day&date=20040701"><script>alert(document.cookie)</script

A2. In the calendar module you have an option to
search any text. The module
doesn't makes any sanitization of the user
pased string. If you insert the
following text you will see the vulnerability :

"><script>alert(document.cookie)</script>

A3. In the Address book module eGroupWare
has the same problem. To try the
vulnerability Click on Address Book (at the top of
the web page) and in
the search field insert the following text, in a new
example :

"><h1>That's fun!</h1>

These are the parameters that are vulnerables :

At /egroupware/index.php?menuaction=addressbook.uiaddressbook.index :

Field parameter
Filter parameter
QField parameter
Start parameter

A4. The option to search between projects is
also vulnerable. Try this :

1.- Go to
http://<site-with-egroupware>/egroupware/index.php?menuaction=preferences.uiaclprefs.index&acl_app=projects
2.- Insert "><h1>this is new, and other XSS
vulnerability...</h1>

A5. In the messenger modules (when
composing a new message) "Subject"
field allows potentially dangerous HTML, such
as, in other new example :

">hi<img src="http://localhost/anyimage"
onload="javascript:alert(document.cookie)">

A6. In the Ticket module when making the same
action (creating a new element)
the same field (Subject) is also vulnerable.

The fix:
~~~~~~~~

Vendor is not yet contacted or I have no
response

---------------------------------------------------------------------------
Contact:
~~~~~~~~

Joxean Koret at
joxeanpiti<<<<<<<<@>>>>>>>>yah00<<<<<<dot>>>>>es



Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close