Advertisement






Antville 1.1 Cross Site Scripting

CVE Category Price Severity
CVE-2005-3530 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2005-11-18
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0.03559 0.51087

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2005110028

Below is a copy:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SA0004

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++++         Antville 1.1 Cross Site Scripting         +++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

PUBLISHED ON
  Nov 09, 2005

PUBLISHED AT
  http://moritz-naumann.com/adv/0004/antvxss/0004.txt
  http://moritz-naumann.com/adv/0004/antvxss/0004.txt.sig

PUBLISHED BY
  Moritz Naumann IT Consulting & Services
  Hamburg, Germany
  http://moritz-naumann.com/

info AT moritz HYPHON naumann D0T com
  GPG key: http://moritz-naumann.com/keys/0x277F060C.asc

AFFECTED APPLICATION OR SERVICE
  Antville
  http://www.antville.org/

AFFECTED VERSION
  Version 1.1
  Possibly versions 1.0 and lower (untested)

BACKGROUND
  Everybody knows XSS.
  http://en.wikipedia.org/wiki/XSS
  http://www.cgisecurity.net/articles/xss-faq.shtml

ISSUE
  A XSS vulnerability has been detected in Antville. The
  problem is caused by insufficient input sanitation.

By making a victim visit a specially crafted URL, it is
  possible to inject client side scripting (such as
  Javascript) and HTML which will be executed/rendered in
  her browser.

The following URL demonstrates this issue:
    [antville_basepath]/project/<script>alert('XSS');</script>

This may not be easily exploitable for cookie/session
  stealing attacks due to the IP address lock on the session.

WORKAROUND
  Client: Disable Javascript.
  Server: Prevent access to the Antville installation.

SOLUTIONS
  There does not seem to be a patch available. Our attempts
  to contact the developers were unsuccessful.

TIMELINE
  Sep 19, 2005  Discovery
  Sep 19, 2005  Code maintainer notification
  Sep 29, 2005  Another code maintainer notification
  Nov 09, 2005  Public disclosure

REFERENCES
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3530

ADDITIONAL CREDIT
  N/A

LICENSE
  Creative Commons Attribution-ShareAlike License Germany
  http://creativecommons.org/licenses/by-sa/2.0/de/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDcijWn6GkvSd/BgwRAt1GAJwKCc/BKl9UKEGc4gNH3iO61em0xQCggqKG
vr3wn/zqL0VwrGk/rEqhbR0=
=s8WY
-----END PGP SIGNATURE-----

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum