[25217] in bugtraq

home help back first fref pref prev next nref lref last post

vqServer Demo Files Cross-Site Scripting

daemon@ATHENA.MIT.EDU (Matthew Murphy)
Tue Apr 23 00:41:15 2002

Message-ID: <000501c1e947$9239dce0$dd301c41@kc.rr.com>
From: "Matthew Murphy" <mattmurphy@kc.rr.com>
To: <bugtraq@securityfocus.com>, <news@securiteam.com>
Date: Sun, 21 Apr 2002 10:16:54 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

    vqServer is a Windows web server written in Java.  It is an innovative
product, with support internally for Servlets, and external support for many
kinds of CGI, (EXE, Perl, ...)

    However, some of the examples shipped in a default configuration of
vqServer contain multiple cross-site scripting vulnerabilities.  In one
case, it is possible to create a cookie-based(?) attack that persists
forever for a specific IP address.  This could be used to attack the target
via "Cookie Scripting" bugs in many known browsers.

Example:

(Requires Perl Interpreter)

http://localhost/cgi/vq/demos/respond.pl?<SCRIPT>alert("I%20should%20not%20b
e%20able%20to%20do%20this!!!")</SCRIPT>


home help back first fref pref prev next nref lref last post