Several server applications are vulnerable to such an technique via various default error pages.
The victim will be presented with information which the compromised site did not wish their visitors to be subjected. This could be used to "sniff" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs.
The CERT/CC has been informed that no patch/update is planned as the vulnerability exists in a section of the software that should be used for internal testing only.
Our thanks to Hiromitsu Takagi, who discovered this instance of the cross-site scripting vulnerability.
This document was originally written by Shawn Hernan in July 2000. It has been adapted for this instance by Jason Rafail.
|Date First Published:||2001-08-27|
|Date Last Updated:||2001-08-27 14:50 UTC|