File: 1835.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (81 lines) | stat: -rw-r--r-- 2,430 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
Rule:

--
Sid:
1835

--
Summary:
This event is generated when a cross-site scripting attack is being 
attempted, or a potential attacker is testing your site to determine if 
it is vulnerable.

--
Impact:
Successful cross-site scripting attacks generally target the users of 
your web site. Attackers can potentially gain access to your users' 
cookies or session ids, allowing the attacker to impersonate your
user. They could also set up elaborate fake logon screens to steal 
user names and passwords.

--
Detailed Information:
Whenever a web application accepts input (either via the URL or the 
POST method) and then uses that input as part of the HTML of a new page 
without filtering, the application is vulnerable to cross-site 
scripting.  The traditional means of exploiting this is to embed a 
"<SCRIPT>" tag into the input. The code following the tag is then 
executed by the victim's browser.

--
Affected Systems:
Many older versions of web server software are affected, as are numerous
web applications.

--
Attack Scenarios:
The most common avenue of attack is for the attacker to send an HTML 
formatted email to the victim. The email will contain a link to a 
specially crafted URL which contains the exploit. When the victim clicks
on the link, they are directed to the vulnerable web site and the attack
code is executed by their browser.

--
Ease of Attack:
Moderately Easy.  Exploit code exists to automate attacks against users 
of some widely deployed web applications which are known to be 
vulnerable. 

Finding vulnerabilities in other, including proprietary, web
applications is fairly trivial and existing exploit code could easily be
modified to take advantage of newly discovered vulnerabilities.

--
False Positives:
Web pages that legimately include the <SCRIPT> tag could generate this 
event under certain circumstances.

--
False Negatives:
None known.

--
Corrective Action:
Determine if your web application is actually vulnerable to this 
attack. If it is and the application is not of your own design, contact 
the authors or vendor and see if there is a patch or newer version.

If the application is proprietary to you or your company, ensure that it 
properly validates input.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>
Snort documentation contributed by Kevin Peuhkurinen

-- 
Additional References:

--