=========================================================== DCP Portal: Multiple XSS Vulnerabilities =========================================================== Technical University of Vienna Security Advisory TUVSA-0603-001, March 9, 2006 =========================================================== Affected applications ---------------------- DCP Portal (www.dcp-portal.com) Versions 6.1.1 and prior. Description ------------ There are multiple cross-site scripting (XSS) vulnerabilities which can be verified by using the following exploits (the user needs to be logged in). They are roughly sorted by entry points (i.e., the names of the files that have to be navigated).The vulnerabilities were discovered under the assumption that register_globals is on, and that magic_quotes_gpc is off. index.php ----------- - index.php, 380: http://localhost/dcp-portal611/index.php?page=documents&dl=xyz&its_url=xyz.html"> - index.php, 690: http://localhost/dcp-portal611/index.php?page=send_write&url=xyz.html"> calendar.php ------------- - 52: http://localhost/dcp-portal611/calendar.php?subject_color="> - 52: http://localhost/dcp-portal611/calendar.php?images="> - 55: like 52 - 62: http://localhost/dcp-portal611/calendar.php?day= - 77:
- 86: using $_REQUEST['year'], 'month' or 'day': http://localhost/dcp-portal611/calendar.php?year= - 92: analogous to lines 52 und 55 ($images) - 149: $_REQUEST['year'] again - 151: $_REQUEST['year'] again - between lines 199 and 219: $_REQUEST[*] again (nine times) - 223: echoing the value returned by function PrintCalendar (composes its return value from $_REQUEST[*]) - 255: repeat - 230: $subject_color, like 52 - 255: $_REQUEST['year'] - 257: $_REQUEST['year'] - 261: $_REQUEST['day'] forums.php ------------ - 95:
- 140: http://localhost/dcp-portal611/forums.php?action=board&bid="> - 191: http://localhost/dcp-portal611/forums.php?action=addtopic&bid=1&replying_msg= - 194:
- 198:
- 207: http://localhost/dcp-portal611/forums.php?action=addtopic&bid=1&mid="> - 231:
inbox.php ----------- - 127:
- 133:
- 353:
automatic submission via JavaScript does not work here - 359: analogous to 353
lostpassword.php ------------------ - 63: http://localhost/dcp-portal611/lostpassword.php?subject_color="> - 64: http://localhost/dcp-portal611/lostpassword.php?email="> mycontents.php ---------------- - 88: http://localhost/dcp-portal611/mycontents.php?action=content&c_name="> - 93: http://localhost/dcp-portal611/mycontents.php?action=content&content_inicial= - 126: http://localhost/dcp-portal611/mycontents.php?action=content&c_name="> - 155: http://localhost/dcp-portal611/mycontents.php?action=addnews&c_name="> - 159: http://localhost/dcp-portal611/mycontents.php?action=addnews&content_inicial= - 185: http://localhost/dcp-portal611/mycontents.php?action=addnews&mode=write&dcp_editor_contingut_html=xyz&c_name=&c_image_name= - 218: http://localhost/dcp-portal611/mycontents.php?action=addanns&c_name="> - 222: $content_inicial again - 248: $c_name again - 315: http://localhost/dcp-portal611/mycontents.php?action=updatecontent&cid="> - 320: http://localhost/dcp-portal611/mycontents.php?action=updatecontent&cid=1&mode=write&c_image_name=xyz&c_name="> - 326: $content_inicial again - 362: $c_name again - 404: $action_submit, via $cid (analogous to 315) - 414: $content_inicial again - 444: $c_name again search.php ------------ - 81:
- 81:
Solution --------- The authors have not responded to our messages, so there is no solution to these issues yet. Timeline: February 19, 2006: Vulnerabilities indicated via andy at codeworx dot ca, but no response. March 9, 2006: Advisory submission. References ----------- http://www.seclab.tuwien.ac.at/advisories/TUVSA-0603-001.txt Nenad Jovanovic Secure Systems Lab Technical University of Vienna www.seclab.tuwien.ac.at