[VIM] [Fwd: Speartek XSS vuln.]

jkouns jkouns at opensecurityfoundation.org
Sat Dec 31 01:13:49 EST 2005

I was just looking at OSVDB 22068: Speartek Search Module XSS

          CVE ID:  2005-4493
      Bugtraq ID:  16018
FrSIRT Advisory:  ADV-2005-3052

I was trying to figure out which one of the applications or demos he 
found this XSS in:

While looking around I saw the Search Module on the site:

It appears that this is a site specific vuln on the website and not a 
vuln in the "Speartek" product or one of the other products....

I then did a quick search in OSVDB on "Search Module XSS".... and it 
looks like almost all of them that do not have specific script 
information may actually be site specific vulns and not vulns in 
products...  even though he lists version numbers.

We have a policy at OSVDB that we do not add site specific vulns... so I 
would like to determine if these are real vulns in products or just r0t 
finding XSS vulns on company websites.


-------- Original Message --------
Subject: 	[OSVDB Mods] Speartek XSS vuln.
Date: 	Wed, 21 Dec 2005 16:34:02 +0100
From: 	Support Service <krustevs at googlemail.com>
To: 	moderators at osvdb.org

Speartek XSS vuln.

Vuln. discovered by : r0t
Date: 21 dec. 2005
orginal advisory:http://pridels.blogspot.com/2005/12/speartek-xss-vuln.html
affected version:6.0 and prior

Product Description:

SpearTek's advanced solutions help you optimize the Internet channel to
fuel ongoing business success. Our technology enables companies to
leverage a single platform to manage content, email marketing and
ecommerce applications, easily and cost-effectively. Whether you are a
multi-million dollar enterprise or a start-up venture, our solutions
advance your business objectives by delivering real return on investment
while enhancing the customer experience.

Vuln. Description:

SpearTek contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to search module paremters
isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust relationship
between the browser and the server, leading to a loss of integrity.

Edit the source code to ensure that input is properly sanitised.
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: file:///C|/DOCUME%7E1/JAKE/LOCALS%7E1/TEMP/nsmail.txt
Url: http://www.attrition.org/pipermail/vim/attachments/20051231/74260223/attachment.txt 

More information about the VIM mailing list