WebCT Mail/Discussion Board Message Script InsertionSunday, 16 March 2008Description:
Benjamin Lupton has reported a vulnerability in WebCT Campus Edition, which can be exploited by malicious users to conduct script insertion attacks.
Input passed as mail or discussion board messages with "Don't wrap text" enabled is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious data is viewed.
Successful exploitation requires that both the attacker and the victim have valid user credentials.
The vulnerability is reported in version 4.1.5.8. Other versions may also be affected.
Solution:
Filter malicious characters and character sequences in a web proxy.
Provided and/or discovered by:
Benjamin "balupton" Lupton
Changelog:
2008-03-11: Added CVE reference.
Original Advisory:
http://www.balupton.com/documents/webct_exploits.txt
http://secunia.com/advisories/29227/
Share this content:
|