Closed
Bug 276985
Opened 21 years ago
Closed 19 years ago
XSS vulnerability in registry/who.cgi
Categories
(Webtools Graveyard :: Tinderbox, defect)
Webtools Graveyard
Tinderbox
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: mikx, Assigned: justdave)
References
()
Details
(Keywords: wsec-xss)
Attachments
(1 file, 4 obsolete files)
|
8.05 KB,
patch
|
bear
:
review+
|
Details | Diff | Splinter Review |
http://tinderbox.mozilla.org/registry/who.cgi?email=<script>alert
(document.cookie)</script>
http://tinderbox.mozilla.org/bonsai/cvsquery.cgi?
module=MozillaBranchTinderboxAll&branch=MOZILLA_1_7_BRANCH&date=explicit&mindate
=><script>alert(document.cookie)</script>
Tested with Internet Explorer 6 using WinXP SP2
| Reporter | ||
Comment 1•21 years ago
|
||
This XSS issue seems to be also part of tinderbox (sometimes the mozilla.org
domain structure is a little confusing to me...)
http://axolotl.mozilla.org/graph/query.cgi?
testname=pageload&tbox=btek&autoscale=1&days=7&avg=1&showpoint=qwertz"><script>a
lert(document.cookie)</script>
Comment 2•19 years ago
|
||
I think the graph.cgi got fixed elsewhere, and cvsquery.cgi is bug 146244
Reassigning to justdave, and confirming because who.cgi is still borked. Not sure you could do much interesting with an XSS on tinderbox (or mecha, which includes bonsai and lxr). Are there admin pages on any of those services? If so you could craft an attack against someone with admin privs to do something interesting.
Ooh, yes, of course there are, "administrate tinderbox trees". That page requires a password for every submit though... there are probably others I'm not privy to.
Assignee: mcafee → justdave
Status: UNCONFIRMED → NEW
Ever confirmed: true
Updated•19 years ago
|
QA Contact: timeless → tinderbox
Comment 3•19 years ago
|
||
Comment 4•19 years ago
|
||
I haven't tested this yet, but it looks somewhat sane. I also fixed some perl warnings while I was at it.
Updated•19 years ago
|
Summary: XSS vulnerability in who.cgi and cvsquery.cgi → XSS vulnerability in registry/who.cgi
Comment 5•19 years ago
|
||
I did some more clean-up to make the file more readable.
Attachment #249932 -
Attachment is obsolete: true
Attachment #249942 -
Flags: review?(justdave)
Attachment #249932 -
Flags: review?(LpSolit)
Comment 6•19 years ago
|
||
Comment on attachment 249942 [details] [diff] [review]
patch - v2
I don't think there's any real way this can be exploited, but if we're going to fix it, the extra text and extra url fields in load_extra_data() should be quoted as well.
Attachment #249942 -
Flags: review?(justdave) → review-
Comment 7•19 years ago
|
||
Encode/quote everything and remove shell_encode().
Attachment #249942 -
Attachment is obsolete: true
Attachment #249955 -
Flags: review?(zach)
Updated•19 years ago
|
Attachment #249955 -
Flags: review?(zach) → review+
Comment 8•19 years ago
|
||
This is what I will check-in, as soon as the patch for 280464 is reviewed and ready.
Attachment #249955 -
Attachment is obsolete: true
Attachment #249982 -
Flags: review+
| Assignee | ||
Comment 9•19 years ago
|
||
OK, based on discussion on bug 280464 and on IRC, here's a do-over.
This completely replaces who.cgi. Since the entire thing is basically a re-presentation of data passed in via the query string, the entire thing has been moved into a Template Toolkit template. This makes it painless to keep track of what's been escaped and what hasn't, etc.
Assignee: reed → justdave
Attachment #249982 -
Attachment is obsolete: true
Attachment #250146 -
Flags: review?
Updated•19 years ago
|
Attachment #250146 -
Flags: review? → review+
| Assignee | ||
Comment 10•19 years ago
|
||
Checking in who.cgi;
/cvsroot/mozilla/webtools/registry/who.cgi,v <-- who.cgi
new revision: 1.12; previous revision: 1.11
done
RCS file: /cvsroot/mozilla/webtools/registry/who.html.tmpl,v
done
Checking in who.html.tmpl;
/cvsroot/mozilla/webtools/registry/who.html.tmpl,v <-- who.html.tmpl
initial revision: 1.1
done
Group: webtools-security
Status: ASSIGNED → RESOLVED
Closed: 19 years ago
Resolution: --- → FIXED
Comment 11•12 years ago
|
||
Adding keywords to bugs for metrics, no action required. Sorry about bugmail spam.
Keywords: wsec-xss
Updated•11 years ago
|
Product: Webtools → Webtools Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•