[VulnWatch] LiteServe Directory Index Cross-Site Scripting

From: Matthew Murphy (mattmurphyat_private)
Date: Thu Nov 07 2002 - 19:30:08 PST

  • Next message: Matthew Murphy: "LiteServe Directory Index Cross-Site Scripting"

    There are three different places in the directory index of LiteServe where
    unsanitized user input is returned to the browser.  The first is yet another
    wildcard DNS vulnerability, the second centers around query strings.
    
    Write-Up: http://www.techie.hopto.org/vulns/2002-37.txt
    
    * DNS Wildcard XSS
    
    This is similar to the Apache XSS of last month.  A malicious 'Host' header
    entity is created by a specially encoded hostname.  When the hostname is
    rejected by the DNS server, the request is routed back to the parent:
    
    http://%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22alert%28location%2Ehref%29%22%3E
    .liteserve.net/dir
    
    * Directory Query String XSS
    
    The LiteServe directory indexing system fails to strip query strings from
    indexed folders, meaning that the URL returned by LiteServe is susceptible
    to cross-site scripting.  URL decoding is performed before return:
    
    http://liteserve.net/dir?%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22alert%28locati
    on%2Ehref%29%22%3E
    
    These are essentially the same HTML, just different issues.  There is also a
    title tag that isn't filtered:
    
    http://liteserve.net/dir?%3C%2FTITLE%3E%3CIMG%20SRC%3D%22%22%20ONERROR%3D%22
    alert%28location%2Ehref%29%22%3E
    



    This archive was generated by hypermail 2b30 : Fri Nov 08 2002 - 08:04:21 PST