Full Disclosure mailing list archives

XSS Vulnerability in AuthentiX


From: Chris Castaldo <chris.castaldo () gmail com>
Date: Tue, 26 Feb 2008 14:56:01 -0500

Description:
"Form-based or 100% cookie-free "Basic Authentication" website 
protection while keeping your NT Users Names and Passwords private. 
Protect all files, not just ASP pages. Validate against internal 
database, text file or external ODBC datasource." - www.flicks.com

Summary:
The AuthentiX administration page suffers from XSS vulnerabilities.  By 
default the /aspAdmin page is not accessible by remote users.

Example:
https://www.HOST.com/aspAdmin/editUser.asp?username=%3CMETA%20HTTP-EQUIV=%22refresh%22%20CONTENT=%220;%20URL=http://www.google.com/%22%3E

Vendor Contact:
20080222 Vulnerability discovered/
20080225 Vendor contacted and responded same day. 

Fix:
Vendor recommends to not allow the admin page to be accessible 
remotely.  If remote accessibility is required then password protect the 
/aspAdmin directory.

Discovered by:
William Hicks & Chris Castaldo

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: