[原文]Multiple cross-site scripting (XSS) vulnerabilities in Active Auction House allow remote attackers to inject arbitrary web script or HTML via the (1) ReturnURL, (2) password, (3) username parameter, (4) ReturnURL parameter to account.asp, (5) Table, (6) Title parameter to sendpassword.asp, or (7) itemid to watchthisitem.asp.
Active Auction House start.asp ReturnURL Parameter XSS
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Active Auction House contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'ReturnURL', 'password' or 'username' variables upon submission to the start.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Discovery of this vulnerability is credited to dcrab <firstname.lastname@example.org>.
Active Web Softwares Active Auction House
Active Auction House is reportedly affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
No exploit is required.
The following proof of concept is available: http://www.example.com/activeauctionsuperstore/watchthisitem.asp?itemid=">&lt;script&gt;alert(document.cookie)&lt;/script&gt;&amp%3baccountid=
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: email@example.com <mailto:firstname.lastname@example.org>.