Bugtraq mailing list archives

Xitami 2.5 Beta Errors.gsl Script Injection Vulnerabilities


From: "Matthew Murphy" <mattmurphy () kc rr com>
Date: Thu, 27 Jun 2002 01:43:01 -0500

[ SecurityFocus: BID #5025 describes this issue; may it be noted that older
versions
are NOT vulnerable. ]

In Xitami 2.5 Beta, a GSL feature was implemented.  GSL is an XML-type
server-side
language.  Xitami demonstrates this with two sample scripts.  Errors.gsl is
used for error
processing in servers where it has been enabled.  (Disabled by default)

Errors.gsl poorly checks the hostname of the input request, only filtering
SCRIPT (case
insensitive filter) out of the host.  So, events can be fired to run code:

http://www.<IMG%20SRC=""%20ONERROR="alert(document.cookie)">.target.com/erro
r404

It also does not check the User-Agent field AT ALL:

[ telnet target.net 80 ]

GET / HTTP/1.0
User-Agent: <SCRIPT>alert(document.cookie);</SCRIPT>

[ End sent data ]

Xitami will return the script in the output.  If an attacking page can
control the
User-Agent (or any part of it), it can run code on a visiting browser in the
name
of the site running the Beta.

Vendor: iMatix has forwarded my original post to the discussion forum, and
will
update the script in future beta releases.

References:

iMatix Home Page (iMatix)
http://www.imatix.com

Xitami Home Page (iMatix)
http://www.xitami.com

Other Issues:

Xitami Web Server Plaintext Administrator Password Storage (SecuriTeam [By
ace; shellcode () attbi com])
Defaults.aut Displays Un-encrypted Admin Password
http://www.securiteam.com/windowsntfocus/5CP0M0A7FU.html

Xitami Reserved Device DoS Vulnerability (SecuriTeam [By neme-dhc;
neme-dhc () hushmail com])
AUX Device Access Causes Server Hang
http://www.securiteam.com/windowsntfocus/5PP0R1F41O.html

Xitami CGI Processing Failure Vulnerability (SecuriTeam)
CGI Script Processing Error Allows Code Disclosure
http://www.securiteam.com/securitynews/5TP0L0075K.html


Current thread: