[] NeoSense

ArbitroWeb PHP Proxy 0.5/0.6 - Cross-Site Scripting

Author: Josh Gilmour
type: webapps
platform: php
port: 
date_added: 2004-06-22 
date_updated: 2013-01-20 
verified: 1 
codes: CVE-2004-0617;OSVDB-14799 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/10592/info

It is reported that ArbitroWeb is susceptible to a cross-site scripting vulnerability in its rawURL URI parameter.

The URI parameter passed to 'index.php' called 'rawURL' contains the desired target for the proxy to connect to. This parameter is improperly sanitized, and may be used in a cross-site scripting attack.

An attacker may craft a URI that contains malicious HTML or script code. If a victim user follows this link, the HTML contained in the affected URI parameter will be executed in the context of the vulnerable site.

The attacker could use this vulnerability to steal cookie-based authentication credentials, or perform other types of attacks.

http://www.example.com/?rawURL=<script>javascript:alert();</script>