what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

perl-cal-29920.txt

perl-cal-29920.txt
Posted Dec 14, 2005
Authored by Sumit Siddharth

Perl-Cal version 2.99.20, the CGI script written by Acme Software, is susceptible to cross site scripting.

tags | exploit, cgi, perl, xss
SHA-256 | 409897c86dca6af8b40a1da0d915383377f662d53d49fbe1013b03ea0ee1c830

perl-cal-29920.txt

Change Mirror Download
------=_Part_17141_22617522.1134045408185
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Vendor: Perl-Cal

Version tested: Perl-Cal 2.99.20 , other versions may also be affected.

Type: Cross Site Scripting

Severity: Medium

Vulnerability discovered:- 23rd Nov 2005

Date released:-8 dec 2005

Vulnerability Type: Input Validation Error

Overview:- PerlCal is a CGI script written by Acme Software that allows
web-based calendar sharing and related functions.There exists a cross-site
scripting vulnerability as the input in one of the parameters(p0) is not
filtered correctly.

Description:- The cross-site scripting bug can be executed with a URL like
so:

https://localhost/cgi-bin/perlcal/cal_make.pl
?p0=3D%3Cscript%3Ealert('hi');%3C/script%3E

This issue could permit a remote attacker to create a malicious URL link
that includes hostile HTML and script code. If this link were to be
followed, the hostile code may be rendered in the web browser of the victim
user. This would occur in the security context of the affected Web site.

Demonstration:- https://localhost/cgi-bin/perlcal/cal_make.pl
?p0=3D%3Cscript%3Ewindow.open('https://www.google.com');%3Cscript%3E<https://=
www.google.com%27%29;%3Cscript%3E>

Other attacks:-
https://localhost/cgi-bin/perlcal/cal_make.pl
?p0=3D%3Cscript%3Ealert(document.cookie);</script>

Solution:
--------------------
Vendor has released a patch.

Credits:- $um$id

Sumit

------=_Part_17141_22617522.1134045408185
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<br>
Vendor: Perl-Cal<br>
<br>
Version tested: Perl-Cal 2.99.20 , other versions may also be affected.<br>
<br>
Type: Cross Site Scripting<br>
<br>
Severity: Medium<br>
<br>
Vulnerability discovered:- 23rd Nov 2005<br>
<br>
Date released:-8 dec 2005<br>
<br>
Vulnerability Type: Input Validation Error<br>
<br>
Overview:-
PerlCal is a CGI script written by Acme Software that allows web-based
calendar sharing and related functions.There exists a cross-site
scripting vulnerability as the input in one of the parameters(p0) is not
filtered correctly.<br>
<br>
Description:- The cross-site scripting bug can be executed with a URL like =
so:<br>
<br>
<a href=3D"https://localhost/cgi-bin/perlcal/cal_make.pl" target=3D"_blank" =
onclick=3D"return top.js.OpenExtLink(window,event,this)">https://localhost/c=
gi-bin/perlcal/cal_make.pl</a><br>
?p0=3D%3Cscript%3Ealert('hi');%3C/script%3E<br>
<br>
This
issue could permit a remote attacker to create a malicious URL link
that includes hostile HTML and script code. If this link were to be
followed, the hostile code may be rendered in the web browser of the
victim user. This would occur in the security context of the affected
Web site.<br>
<br>
Demonstration:- <a href=3D"https://localhost/cgi-bin/perlcal/cal_make.pl" ta=
rget=3D"_blank" onclick=3D"return top.js.OpenExtLink(window,event,this)">ht=
tp://localhost/cgi-bin/perlcal/cal_make.pl</a><br>
?p0=3D%3Cscript%3Ewindow.open('<a href=3D"https://www.google.com%27%29;%3Csc=
ript%3E" target=3D"_blank" onclick=3D"return top.js.OpenExtLink(window,even=
t,this)">https://www.google.com');%3Cscript%3E</a><br>
<br>Other attacks:-<br>
<a href=3D"https://localhost/cgi-bin/perlcal/cal_make.pl" target=3D"_blank" =
onclick=3D"return top.js.OpenExtLink(window,event,this)">https://localhost/c=
gi-bin/perlcal/cal_make.pl</a><br>

?p0=3D%3Cscript%3Ealert(document.cookie);</script><br>
<br>
Solution:<br>
--------------------<br>
Vendor has released a patch.<br>
<br>
Credits:- $um$id<br>
<br>
Sumit<br>





------=_Part_17141_22617522.1134045408185--
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close