Passive XSS

Discussion regarding Joomla! 3.x security issues.

Moderators: mandville, General Support Moderators

Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Forum Post Assistant / FPA - If you are serious about wanting help, you will use this tool to help you post.
Windows Defender SmartScreen Issues <-- please read this if using Windows 10.
Locked
perry_cox
Joomla! Fledgling
Joomla! Fledgling
Posts: 3
Joined: Thu Mar 28, 2013 10:34 am

Passive XSS

Post by perry_cox » Thu Mar 28, 2013 10:42 am

Hello!

My client scanned the site developed for him with the help of Acunetix.
And he sent to me a report where he asked to correct this one:
URL encoded GET input id was set to 114" onmouseover=prompt(955611) bad=" The input is reflected inside a tag parameter between double quotes.
The url is index.php. I said that it's passive XSS and it's not dangeureous, But client asked to correct it.
What should I perform to solve this problem?

Thank you in advance for help.

DanLanglois
Joomla! Apprentice
Joomla! Apprentice
Posts: 23
Joined: Wed Mar 27, 2013 9:50 pm

Re: Passive XSS

Post by DanLanglois » Thu Mar 28, 2013 11:22 am

I note, that hackers usually have more experience than the web developers.

The problem with the URL, is it leaves the entered variables in the URL address. This is via some form of user input.

Then, the exploit, is attacking a javascript event handler. Allowing users to post javascript code. It's not that complex an attack at all either - rather embarrassing for Twitter that they were caught out by this.
And, you can write anything to the page, including closing the link and including a script element. Also, you are not limited by the 140 character limit.

To fix it, well, what is the relevant page source, I mean this parameter gets set, how? A form? Is there a form on the page. A form can be a post and not a get request. I'm not positive what will satisfy, but they don't like the get request, you can eliminate the get request. Let's put this in context, search spiders will follow every link on your website, but will not submit random forms they find.
And, web accelerators are worse than search spiders, because they run on the client’s machine, and "click" all links in the context of the logged in user. Thus, an application that uses a GET request to delete stuff, even if it requires an administrator, will happily obey the orders of the (non-malicious!) web accelerator and delete everything it sees.

perry_cox
Joomla! Fledgling
Joomla! Fledgling
Posts: 3
Joined: Thu Mar 28, 2013 10:34 am

Re: Passive XSS

Post by perry_cox » Thu Mar 28, 2013 11:52 am

The url is http://domain4test.ru/it-outsource/88-s ... ew=article

I should fix method onmouseover if i get it right. But how should I do this - I don't know - pls help me

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 15152
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Passive XSS

Post by mandville » Thu Mar 28, 2013 12:05 pm

perry_cox wrote:My client scanned the site developed for him with the help of Acunetix.
And he sent to me a report where he asked to correct this one:
Please contact the 'scanner' provider for interpretation of their reports
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be reported, added to the foe list and possibly just deleted
{VEL Team Leader}{TM Auditor }{ Showcase & Security forums Moderator}

perry_cox
Joomla! Fledgling
Joomla! Fledgling
Posts: 3
Joined: Thu Mar 28, 2013 10:34 am

Re: Passive XSS

Post by perry_cox » Thu Mar 28, 2013 12:35 pm

mandville wrote:
perry_cox wrote:My client scanned the site developed for him with the help of Acunetix.
And he sent to me a report where he asked to correct this one:
Please contact the 'scanner' provider for interpretation of their reports
Ok. Sent to them a request. I'll post here their response.

Thank you.

DanLanglois
Joomla! Apprentice
Joomla! Apprentice
Posts: 23
Joined: Wed Mar 27, 2013 9:50 pm

Re: Passive XSS

Post by DanLanglois » Thu Mar 28, 2013 1:00 pm

jHackGuard might do it. Just install the extension.

User avatar
PhilD
Joomla! Hero
Joomla! Hero
Posts: 2737
Joined: Sat Oct 21, 2006 10:20 pm
Location: Wisconsin USA
Contact:

Re: Passive XSS

Post by PhilD » Thu Mar 28, 2013 7:06 pm

The link is contained within your code for the page
<link href="http://domain4test. ru/it-outsource/uslugi/vnedrenie-novykh-servisov/microsoft-forefront-tmg-2010/88-services/new-services/114"%20onmouseover=prompt(955611)%20bad="-podklyuchenie-i-nastrojka-microsoft-exchange-2010" rel="canonical">

The page also contains a form and the template is based on
the T3 Framework by joomlart.

So you need to fix the template or alter the way you are handling things on the page.
PhilD


Locked

Return to “Security in Joomla! 3.x”