Mailing List Archive

ICQ WEB Portal multiple Cross Site Scripting vulnerability
--[ ICQ WEB Portal multiple Cross Site Scripting vulnerability ]--

Problem discovered: 19/09/2001
by Cabezon Aurélien | aurelien.cabezon@iSecureLabs.com |
http://www.iSecureLabs.com

--[ Overview ]--

The icq portal suffer from multiple Cross Site Scripting Vulnerability.
http://www.icq.com

-- [ Description ]--

ICQ web portal may inadvertently include malicious HTML tags or script in a
dynamically generated page based on unvalidated input from untrustworthy
sources.
This can be a problem when a web server does not adequately ensure that
generated pages are properly encoded to prevent unintended execution of
scripts, and when input from a form is not validated to prevent malicious
HTML from being presented to the user.

This search script http://search.icq.com/dirsearch.adp does not check
anymore for malicious HTML or Java Script code.

--[ Exemple 1 ]--
http://search.icq.com/dirsearch.adp?query=<h1>Hello
!</h1><script>alert('hello');</script>est&wh=is&users=1

Screen Shots :
http://www.isecurelabs.com/advisory/icq1.jpg
http://www.isecurelabs.com/advisory/icq2.jpg

--[ Exemple 2 ]--
http://web.icq.com/foo/<script>alert('hello');</script>

Screen Shots :
http://www.isecurelabs.com/advisory/icq3.jpg
http://www.isecurelabs.com/advisory/icq4.jpg


--[ Fix ]--

ICQ Team has been alerted

--[ Informations about CSS ]--

http://httpd.apache.org/info/css-security/apache_specific.html
http://www.cert.org/advisories/CA-2000-02.html

---
Cabezon Aurélien | aurelien.cabezon@iSecureLabs.com
http://www.iSecureLabs.com | French Security Portal
http://www.isecurelabs.com/advisory/icq-css.html