Advisories

CVE-2007-0176: GForge Cross Site Scripting vulnerability

10 January, 2010

Tags: ,

CVSS Score
6.8
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Cross Site Scripting
CWE ID CWE id is not defined for this vulnerability

Version: Tested on GForge 4.5.11
Discovered by: José Ramón Palanco: jpalanco@gmail.com

Description

GForge is vulnerable to a security vulnerability that allow Cross-Site Scripting attacks. Due to improper filtering, a remote attacker can exploit a cross site scripting.

To exploit any attacker may send via GET method the “words” variable to:

>"<script>alert('www.eazel.es')</script>

to http://site/search/advanced_search.php?group_id=X&search=1
where X is any active project in the gforge installation.

Timeline

Discovered: 26/10/2006
Published: 8/01/2007

 

Share with your friends










Submit

Author

Jose Palanco

VP Threat Intelligence at ElevenPaths

Your email address will not be published.