Hi there,

ht://dig 3.1.6 (and maybe newer versions) seems to be vulnerable for
"phishing"-attacks when using the $(WORDS) variable in the 
resultemplates.

When I call htsearch like this:
/cgi-bin/htsearch?words=%3Cfont%20color=%22red%22%3Ehello%3C/font%3E

and the nomatch-template looks like this:

No results for '$(WORDS)'

the result is

No result for '<font color="red">hello</font>'

This makes any website using the $(WORDS) variable in the resultemplates
vulnerable to "phishing"-attacks. 
It should be enough to replace "<" and ">" by "&lt;" and "&gt;" in 
$(WORDS) (and maybe other variables) before output to close this
vulnerability.
 
Could anyone provide a patch to fix this or is this already fixed in
3.2.x?

Regards,
  Roland


-------------------------------------------------------
SF.Net email is sponsored by Shop4tech.com-Lowest price on Blank Media
100pk Sonic DVD-R 4x for only $29 -100pk Sonic DVD+R for only $33
Save 50% off Retail on Ink & Toner - Free Shipping and Free Gift.
http://www.shop4tech.com/z/Inkjet_Cartridges/9_108_r285
_______________________________________________
ht://Dig general mailing list: <[EMAIL PROTECTED]>
ht://Dig FAQ: http://htdig.sourceforge.net/FAQ.html
List information (subscribe/unsubscribe, etc.)
https://lists.sourceforge.net/lists/listinfo/htdig-general

Reply via email to