The Joomla! Forum ™



Forum rules


Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Forum Post Assistant / FPA - If you are serious about wanting help, you will use this tool to help you post.



Post new topic Reply to topic  [ 2 posts ] 
Author Message
PostPosted: Sat Dec 17, 2011 6:01 pm 
Joomla! Fledgling
Joomla! Fledgling

Joined: Sat Dec 17, 2011 5:53 pm
Posts: 1
Hi,
I use GoDaddy.com's Website Protection Site Scanner for many websites I manage. The site scanner came back recently with a warning on one site there is a stating Cross-Site Scripting Vulnerability. I was hoping someone else may have been flagged with this and would be able to help save me a lot of time figuring out a fix. My site is on Joomla 1.7.3.

This is what Site Scanner found
Quote:
Synopsis:

The remote web server is prone to cross-site scripting attacks.
Description:

The remote web server hosts one or more cgi scripts that fail to
adequately sanitize request strings with malicious JavaScript. By
leveraging this issue, an attacker may be able to cause arbitrary HTML
and script code to be executed in a user's browser within the security
context of the affected site. These XSS vulnerabilities are likely to
be 'non-persistent' or 'reflected'.
See Also:

http://en.wikipedia.org/wiki/Cross_site ... persistent
http://www.Site Scanner.org/u?9717ad85
http://projects.webappsec.org/Cross-Site+Scripting
Risk Factor:

Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
Solution:

Restrict access to the vulnerable application. Contact the vendor
for a patch or upgrade.

Output:

Using the POST HTTP method, Site Scanner found that :
+ The following resources may be vulnerable to cross-site scripting (extended patterns) :
+ The 'searchword' parameter of the /component/search/ CGI :
/component/search/ [searchword=508 src=http://www.example.com/exploit508
.js]
-------- output --------
<label for="search-searchword">
Search Keyword: </label>
<input type="text" name="searchword" id="search-searchword" size="30" ma
xlength="20" value="508 src=http://www.example.com/exploit508.js" class=
"inputbox" />
<button name="Search" onclick="this.form.submit()" class="button"> [...]
<input type="hidden" name="task" value="search" />
------------------------
Other references : CWE:79, CWE:80, CWE:81, CWE:83, CWE:20, CWE:74, CWE:442, CWE:712, CWE:722, CWE:725, CWE:811, CWE:751, CWE:801, CWE:116, CWE:692, CWE:86


Thanks in advance!


Top
 Profile  
 
PostPosted: Sat Dec 17, 2011 9:08 pm 
User avatar
Joomla! Master
Joomla! Master

Joined: Mon Mar 20, 2006 1:56 am
Posts: 12550
Location: The Girly Side of Joomla in Sussex
there are 3 parts to this answer
notice the
Quote:
following resources may be vulnerable to cross-site scripting

A lot of site scanners are not worth bothering with
likewise some of hosts

_________________
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security Moderator}


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 



Who is online

Users browsing this forum: No registered users and 14 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Jump to:  
Powered by phpBB® Forum Software © phpBB Group