Hi,

On Wed, Mar 05, 2008 at 04:31:00PM -0500, Guzdial, Mark wrote:
> FYI there is a XSS vuln in Swiki 1.5 exploitable by:
> 
> http://[host]:8000/<script>alert("XSS");</script>

Ouch! And yes, it works. Even through an reverse proxy.

> I'm not even sure I grok the question...

Ehm, you can use the above link on every Swiki installation to execute
any JavaScript code under the domain of the attacked Swiki. This can
be used e.g. to spy out passwords or cookies of the users of the
attacked Swiki site.

If you have an Apache as reverse proxy in front of your Swiki you may
be able to prevent this exploitation by using e.g. mod_rewrite with
something like:

  RewriteEngine On
  RewriteRule [<>] http://[host]/Sorry+no+exploits+here

                Kind regards, Axel Beckert
-- 
Axel Beckert <[EMAIL PROTECTED]>       support: +41 44 633 2668
IT Support Group, HPR E 86.1              voice:   +41 44 633 4189
Departement Physik, ETH Zurich            fax:     +41 44 633 1239
CH-8093 Zurich, Switzerland               http://nic.phys.ethz.ch/
_______________________________________________
Pws mailing list
[email protected]
https://mailman.cc.gatech.edu/mailman/listinfo/pws

Reply via email to