Netscape.com - Cross site scripting vulnerability

----------------------------------------------

Type: Cross site scripting


Date: June, 13th 2006

----------------------------------------------


Credits:

----------------------------------------------

Discovered by: David "Aesthetico" Vieira-Kurz

http://www.majorsecurity.de

----------------------------------------------


Affected pages:

----------------------------------------------

1. http://netscape.com

2. http://search.netscape.com

3. http://channels.netscape.com


Vulnerability:

----------------------------------------------

I found a bug in the search boxes of the Netscape Network.

If you type in a "searchword" into the searchbox of "http://netscape.com"; or 
"http://channels.netscape.com";

you'll be automaticly redirected to "http://search.netscape.com"; and you'll see 
the results of your search.


Input passed to the "query" parameter in "search?"-file is not properly 
sanitised before being returned to the user. 

This can be exploited to execute arbitrary HTML and script code in a user's 
browser session in context of an affected site.


Sending a malicious code will result a code working on the page that pops up...


http://search.netscape.com/ns/search?query=<script>alert("MajorSecurity")</script>


Example:

----------------------------------------------

http://search.netscape.com/ns/search?query=<script>alert("MajorSecurity")</script>


Screenshots:

----------------------------------------------

http://majorsecurity.de/advisory/netscape_bug/netscape1.JPG

http://majorsecurity.de/advisory/netscape_bug/netscape2.JPG

http://majorsecurity.de/advisory/netscape_bug/netscape3.JPG

Reply via email to