On Sun, Jan 23, 2005 at 05:12:15PM +0100, Uwe Hermann wrote:
> Hi,
> 
> sorry, the mail about this bug somehow got lost in my inbox...
> 
> (CC to debian-devel, any help with this issue is welcome)
> 
> 
> On Wed, Nov 17, 2004 at 03:45:55AM +0100, Nicolas Gregoire wrote:
> > Package: info2www
> > Version: 1.2.2.9-22
> > Severity: normal
> > Tags: security
> > 
> > There's a XSS vulnerabilty in the info2www CGI.
> > 
> > The following URL will display the document location using Javascript :
> > /cgi-bin/info2www?(coreutils)<script>alert(document.location)<script>
> 
> Hm, seems like I can't reproduce this. If I enter the above URL in a
> browser (I tried Galeon and Firefox) I get:
If I change it to /script then I can reproduce the alleged problem.  I
guess I don't understand XSS vulnerabilities...  The whole point is
that mallicious Mallory can post a link to nonmallicious site
nice.com/cgi-bin/info2www<script>alert("Boo!")</script>?  That still
seems like a nonissue, because Mallory could just as easily have put
an alert() on his own page (okay, maybe if mallory's page is in a
"mallicious" list, and nice.com is in a "trusted" list it makes
sense).

> > Every user-supplied parameter should be sanitized before use.
> 
> ACK, I'll try to check the code, but it won't be easy I guess. The code
> is from 1996, unmaintained and quite surely contains lots more security
> issues.
This shouldn't be difficult, really.  The only user input comes from
the URL, and it should probably be restricted to certain character
ranges [a-z0-9-] or something.

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to