WebBatch Cross-Site Scripting VulnerabilityThursday, 20 September 2007This issue is due to a failure in the application to properly sanitize
user-supplied input. Attackers may exploit this issue via a web client. An
attacker may leverage this issue to have arbitrary script code execute in
the browser of an unsuspecting user in the context of the affected site.
This may help the attacker steal cookie-based authentication credentials
and launch other attacks.
Hackers Center Security Group (http://www.hackerscenter.com)
Credit: Doz
Risk: Medium
Class: Input Validation Error
Remote: YES
Local: N/A
Platform: Windows Servers
Vendor: Wilson WindowWare, Inc
Product: WebBatch
http://winbatch.com/
Vulrnable Files:
webbatch.exe
* Attackers can exploit these issues via a web client.
Exploits:
/webcgi/webbatch.exe?XSS
/webcgi/webbatch.exe?PATH/XSS
Remote System Info Exposure:
/webcgi/webbatch.exe?dumpinputdata
Google Search: (webbatch.exe)
www.google.com/search?hl=en&q=ext%3Aexe+inurl%3A%28%7Cwebbatch%7C%29&btnG=Search
http://hackerscenter.com/Archive/view.asp?id=27988
Share this content:
|