Hi,

I've checked out the latest version from svn. That version sends the 
name/value pair of the submit button and finds the vulnerability. 
Although it reports the same vulnerability twice:

frank@darkstar:/tmp/w3af$ ./w3af_console
w3af>>> target
w3af/config:target>>> set target http://localhost/test/button.php
w3af/config:target>>> back
w3af>>> plugins
w3af/plugins>>> audit xss
w3af/plugins>>> back
w3af>>> start
Found 1 URLs and 2 different points of injection.
The list of URLs is:
- http://localhost/test/button.php
The list of fuzzable requests is:
- http://localhost/test/button.php | Method: GET
- http://localhost/test/button.php | Method: POST | Parameters: (inp="")
Cross Site Scripting was found at: "http://localhost/test/button.php";, 
using HTTP method POST. The sent post-data was: 
"inp=<SCrIPT>alert("YVn3")</SCrIPT>&sbm=submit". This vulnerability 
affects ALL browsers. This vulnerability was found in the request with 
id 17.
Cross Site Scripting was found at: "http://localhost/test/button.php";, 
using HTTP method POST. The sent post-data was: 
"inp=<SCrIPT>alert("YVn3")</SCrIPT>&sbm=submit". This vulnerability 
affects ALL browsers. This vulnerability was found in the request with 
id 17.
Scan finished in 0 seconds.

Regards,
Frank

On 29-08-11 15:52, Javier Andalia wrote:
> Hey Frank,
>
> Can you please update by performing a regular "svn update" and try 
> again? Seems that w3af's update procedure is failing for some reason.
>
> Thanks
>
> Javier
>
>
> On 08/27/2011 09:23 AM, Frank van der Loo wrote:
>> Hi,
>>
>> I have updated w3af to r4391, but the results are still the same:
>> frank@darkstar:/tmp/w3af$ ./w3af_console
>> w3af>>>  target
>> w3af/config:target>>>  set target http://localhost/test/button.php
>> w3af/config:target>>>  back
>> w3af>>>  plugins
>> w3af/plugins>>>  audit xss
>> w3af/plugins>>>  back
>> w3af>>>  start
>> Found 1 URLs and 2 different points of injection.
>> The list of URLs is:
>> - http://localhost/test/button.php
>> The list of fuzzable requests is:
>> - http://localhost/test/button.php | Method: GET
>> - http://localhost/test/button.php | Method: POST | Parameters: (inp="")
>> Scan finished in 0 seconds.
>> w3af>>>  version
>> w3af - Web Application Attack and Audit Framework
>> Version: 1.0-stable-4286 (from SVN server)
>> Revision: 4391
>> Author: Andres Riancho and the w3af team.
>>
>> I have attached the log of the packet sniffer, that shows that the
>> name/value pair of the submit-button is not sent here.
>>
>> Regards,
>> Frank
>>
>> On 26-08-11 21:01, Javier Andalia wrote:
>>> Hey Frank,
>>>
>>> Can you give it a try? We've just submitted the fix for this problem.
>>>
>>> Thanks,
>>>
>>> Javier
>>>
>>>
>>> On 08/25/2011 09:05 PM, Andres Riancho wrote:
>>>> Frank,
>>>>
>>>> Good you confirmed this. I found a bug! But it's not in the process of
>>>> parsing/injecting/etc. It's in the way we print stuff to the console.
>>>> I'll explain this to Javier tomorrow (it has something to do with the
>>>> unicode change he did a couple of weeks ago).
>>>>
>


------------------------------------------------------------------------------
EMC VNX: the world's simplest storage, starting under $10K
The only unified storage solution that offers unified management 
Up to 160% more powerful than alternatives and 25% more efficient. 
Guaranteed. http://p.sf.net/sfu/emc-vnx-dev2dev
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to