# # written by K-Otik.com # # ezPublish Cross Site Scripting Bugs # # Message-ID: <1642444765.20030319015935@olympos.org> # From: Ertan Kurt # To: # Subject: Some XSS vulns # if (description) { script_id(11449); script_bugtraq_id(7137, 7138); script_cve_id("CAN-2003-0310"); script_version ("$Revision$"); script_name(english:"ezPublish Cross Site Scripting Bugs"); desc["english"] = " ezPublish 2.2.7 has a cross site scripting bug. An attacker may use it to perform a cross site scripting attack on this host. In addition to this, another flaw may allow an attacker store hostile HTML code on the server side, which will be executed by the browser of the administrative user when he looks at the server logs. Solution : Upgrade to a newer version. Risk factor : Medium"; script_description(english:desc["english"]); script_summary(english:"Determine if ezPublish is vulnerable to xss attack"); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses", francais:"Abus de CGI"); script_copyright(english:"This script is Copyright (C) 2003 k-otik.com"); script_dependencie("find_service.nes", "no404.nasl", "cross_site_scripting.nasl"); script_require_ports("Services/www", 80); exit(0); } include("http_func.inc"); include("http_keepalive.inc"); port = get_kb_item("Services/www"); if (!port) port = 80; if(!get_port_state(port))exit(0); if(get_kb_item(string("www/", port, "/generic_xss"))) exit(0); dir = make_list(cgi_dirs(), ""); foreach d (dir) { url = string(d, "/search/?SectionIDOverride=1&SearchText="); req = http_get(item:url, port:port); buf = http_keepalive_send_recv(port:port, data:req, bodyonly:1); if( buf == NULL ) exit(0); if("" >< buf) { security_warning(port:port); exit(0); } }