[13691] in bugtraq

home help back first fref pref prev next nref lref last post

Cross Site Scripting security issue

daemon@ATHENA.MIT.EDU (Robert Zilbauer)
Thu Feb 3 15:43:00 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Message-Id:  <3.0.5.32.20000202185453.0091f740@slappy.org>
Date:         Wed, 2 Feb 2000 18:54:53 -0800
Reply-To: Robert Zilbauer <zilbauer@SLAPPY.ORG>
From: Robert Zilbauer <zilbauer@SLAPPY.ORG>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

>Date: Wed, 2 Feb 2000 12:22:12 -0700 (MST)
>From: Marc Slemko <marcs@znep.com>
>To: announce@apache.org
>Subject: Cross Site Scripting security issue
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
>As you may already be aware, today CERT released an advisory about
>a security vulnerability that has been discovered associated with
>malicious HTML tags (especially scripting tags) being embedded in
>client web requests.  The common name currently associated with this
>problem is "Cross Site Scripting", even though this name is not entirely
>accurate in its description of the problem.
>
>Please review the CERT advisory available at:
>
>        http://www.cert.org/advisories/CA-2000-02.html
>
>for more details.  Pay particular attention to their Tech Tip for
>Web Developers, available at:
>
>        http://www.cert.org/tech_tips/malicious_code_mitigation.html
>
>There are a number of ways in which this issue impacts Apache itself,
>and many more ways in which it impacts sites developed using related
>technologies such as Apache modules, CGI scripts, mod_perl, PHP, etc.
>that runs on top of Apache.  We have put together some information
>about this and it is available at:
>
>        http://www.apache.org/info/css-security/
>
>Please visit this page for more information if you think this
>problem impacts your site or if you don't understand if the problem
>impacts your site.  Included on this page are patches to Apache to
>fix a number of related bugs and to add a number of features that
>may be helpful in defending against this type of attack.  We expect to
>release a new version of Apache in the immediate future that includes
>these patches, but do not yet have an exact timeline planned for this
>release.
>
>Please note that this issue does not in any way compromise the security
>of your server directly.  All the issues related to this involve tricking
>a client into doing something that is not what the user intends.
>
>We expect to update our pages with more information in the future,
>as more of the details of and consequences of this issue are
>discovered.
>
>
>- --
>     Marc Slemko     | Apache Software Foundation member
>     marcs@znep.com  | marc@apache.org
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGPfreeware 5.0i for non-commercial use
>Charset: noconv
>
>iQCVAwUBOJiD51Qv/g4Arev1AQFp+AP+PYknXFPhcFExJvrZ2OdXhR43w2Fwuhgp
>UzhJFj8WLnpuaXNipQnE5/lVxNu2s7X6hshPP9GpDUkhU8u0WMXcJqydI4+/1OEV
>O2yRhVeIMwhE8k38SDxIiJJ+DsPQJ5p/Rfi8tZRh4GneSU5JBhY3d5hkumfsPocs
>NZYgV5YnhRs=
>=fSkT
>-----END PGP SIGNATURE-----
>
>
-----
Robert C. Zilbauer, Jr.                          Long live the new flesh.
Primary: zilbauer@slappy.org                  Secondary: zilbauer@efn.org

          "Ph'nglui mglw'nafh Cthulhu R'lyeh wgah'nagl fhtagn."

home help back first fref pref prev next nref lref last post