[26023] in bugtraq

home help back first fref pref prev next nref lref last post

CSS in blackboard

daemon@ATHENA.MIT.EDU (Berend-Jan Wever)
Mon Jul 1 17:56:00 2002

Date: 1 Jul 2002 18:44:25 -0000
Message-ID: <20020701184425.1232.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Berend-Jan Wever <skylined@edup.tudelft.nl>
To: bugtraq@securityfocus.com



Product: Blackboard 5
Vendor: Blackboard inc
Website: www.Blackboard.com

Reported: 24 apr 2002: Discovered CSS in blackboard program and 
company.blackboard.com. Reported CSS in blackboard program at 
http://company.blackboard.com/contactus/Suggestions.cgi.
Reported CSS in company.blackboard.com to dyaskin@blackboard.com

Problem: Blackboard 5 contains multiple input validation errors, 
exploitable with Cross-site scripting, an example: http://
[server]/bin/login.pl?course_id=">&lt;SCRIPT&gt;alert()&lt;/SCRIPT&gt;
The people at Blackboard seem not to have a clue about CSS and have 
therefore almost totally forgotten to check the user input against illegal 
characters. Even more interresting than the "poisoned link" example above 
is the possibility to create a "CSS Traps" by poisoning messages in the 
group discussion board. SCRIPTs can be inserted into the title of messages.

Some more examples of the apparant ignorance of the people at blackboard:
http://company.blackboard.com/contactus/ProcessInfo.cgi?Response=7&CTID="]
[SCRIPT]alert(document.cookie)[/SCRIPT]
http://company.blackboard.com/contactus/index.cgi?Message=[SCRIPT]alert
(document.cookie)[/SCRIPT]
(replace [ & ] with < & >, duh...)

Berend-Jan Wever aka SkyLined
http://spoor12.edup.tudelft.nl

http://spoor12.edup.tudelft.nl/SkyLined v4.2/?Cross site scripting archive

home help back first fref pref prev next nref lref last post