Advertisements

 WebCT Mail/Discussion Board Message Script Insertion

Sunday, 16 March 2008

Description:
Benjamin Lupton has reported a vulnerability in WebCT Campus Edition, which can be exploited by malicious users to conduct script insertion attacks.

Input passed as mail or discussion board messages with "Don't wrap text" enabled is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious data is viewed.

Successful exploitation requires that both the attacker and the victim have valid user credentials.

The vulnerability is reported in version 4.1.5.8. Other versions may also be affected.

Solution:
Filter malicious characters and character sequences in a web proxy.

Provided and/or discovered by:
Benjamin "balupton" Lupton

Changelog:
2008-03-11: Added CVE reference.

Original Advisory:
http://www.balupton.com/documents/webct_exploits.txt

http://secunia.com/advisories/29227/



Share this content:
        
Advertisements
Home | News | Articles | Advisories | Submit | Alerts | Links | What is XSS | About | Contact | Some Rights Reserved.