Package: nusoap
Version: 0.9.5-1
Owner: [email protected]
Tags: security

Bogdan Calin of Acunetix discovered some cross site scripting
vulnerabilities in NuSOAP 0.9.5 relating to lack of escaping of
PHP_SELF. This is an issue because of potentially malicious URLs being
constructed along the lines of:

http://site/soapserver.php/1%3CScRiPt%3Eprompt(923395)%3C/ScRiPt%3E

In such an event, NuSOAP will print a WSDL output page (service
description) containing the maliciously crafted URL.

An upstream bug report exists at
http://sourceforge.net/projects/nusoap/forums/forum/193579/topic/3834005
and a preliminary patch has been provided by the MantisBT project (which
bundles NuSOAP) at: http://www.mantisbt.org/bugs/view.php?id=12312




-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to