Hi, On Wed, Mar 05, 2008 at 04:31:00PM -0500, Guzdial, Mark wrote: > FYI there is a XSS vuln in Swiki 1.5 exploitable by: > > http://[host]:8000/<script>alert("XSS");</script>
Ouch! And yes, it works. Even through an reverse proxy. > I'm not even sure I grok the question... Ehm, you can use the above link on every Swiki installation to execute any JavaScript code under the domain of the attacked Swiki. This can be used e.g. to spy out passwords or cookies of the users of the attacked Swiki site. If you have an Apache as reverse proxy in front of your Swiki you may be able to prevent this exploitation by using e.g. mod_rewrite with something like: RewriteEngine On RewriteRule [<>] http://[host]/Sorry+no+exploits+here Kind regards, Axel Beckert -- Axel Beckert <[EMAIL PROTECTED]> support: +41 44 633 2668 IT Support Group, HPR E 86.1 voice: +41 44 633 4189 Departement Physik, ETH Zurich fax: +41 44 633 1239 CH-8093 Zurich, Switzerland http://nic.phys.ethz.ch/ _______________________________________________ Pws mailing list [email protected] https://mailman.cc.gatech.edu/mailman/listinfo/pws
