Cross-Site Reference Voluerability Help

Discussion regarding Joomla! 2.5 security issues.

Moderators: mandville, General Support Moderators

Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Forum Post Assistant / FPA - If you are serious about wanting help, you will use this tool to help you post.
Locked
rwgt0su
Joomla! Apprentice
Joomla! Apprentice
Posts: 6
Joined: Sat Dec 17, 2011 5:53 pm

Cross-Site Reference Voluerability Help

Post by rwgt0su » Sat Dec 17, 2011 6:01 pm

Hi,
I use GoDaddy.com's Website Protection Site Scanner for many websites I manage. The site scanner came back recently with a warning on one site there is a stating Cross-Site Scripting Vulnerability. I was hoping someone else may have been flagged with this and would be able to help save me a lot of time figuring out a fix. My site is on Joomla 1.7.3.

This is what Site Scanner found
Synopsis:

The remote web server is prone to cross-site scripting attacks.
Description:

The remote web server hosts one or more cgi scripts that fail to
adequately sanitize request strings with malicious JavaScript. By
leveraging this issue, an attacker may be able to cause arbitrary HTML
and script code to be executed in a user's browser within the security
context of the affected site. These XSS vulnerabilities are likely to
be 'non-persistent' or 'reflected'.
See Also:

http://en.wikipedia.org/wiki/Cross_site ... persistent
http://www.Site Scanner.org/u?9717ad85
http://projects.webappsec.org/Cross-Site+Scripting
Risk Factor:

Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
Solution:

Restrict access to the vulnerable application. Contact the vendor
for a patch or upgrade.

Output:

Using the POST HTTP method, Site Scanner found that :
+ The following resources may be vulnerable to cross-site scripting (extended patterns) :
+ The 'searchword' parameter of the /component/search/ CGI :
/component/search/ [searchword=508 src=http://www.example.com/exploit508
.js]
-------- output --------
<label for="search-searchword">
Search Keyword: </label>
<input type="text" name="searchword" id="search-searchword" size="30" ma
xlength="20" value="508 src=http://www.example.com/exploit508.js" class=
"inputbox" />
<button name="Search" onclick="this.form.submit()" class="button"> [...]
<input type="hidden" name="task" value="search" />
------------------------
Other references : CWE:79, CWE:80, CWE:81, CWE:83, CWE:20, CWE:74, CWE:442, CWE:712, CWE:722, CWE:725, CWE:811, CWE:751, CWE:801, CWE:116, CWE:692, CWE:86
Thanks in advance!

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 15152
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Cross-Site Reference Voluerability Help

Post by mandville » Sat Dec 17, 2011 9:08 pm

there are 3 parts to this answer
notice the
following resources may be vulnerable to cross-site scripting
A lot of site scanners are not worth bothering with
likewise some of hosts
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be reported, added to the foe list and possibly just deleted
{VEL Team Leader}{TM Auditor }{ Showcase & Security forums Moderator}


Locked

Return to “Security in Joomla! 2.5”