Several server applications are vulnerable to such an technique via various default error pages.
The victim will be presented with information which the compromised site did not wish their visitors to be subjected. This could be used to "sniff" sensitive data from within the web page, including passwords, credit card numbers, and any arbitrary information the user inputs.
The CERT/CC is currently unaware of a practical solution to this problem.
Our thanks to Hiromitsu Takagi, who discovered this instance of the cross-site scripting vulnerability.
This document was originally written by Shawn Hernan in July 2000. It has been adapted for this instance by Jason Rafail.
|Date First Published:||2001-07-27|
|Date Last Updated:||2001-07-30 19:00 UTC|