Document Title:
===============
WhiteHouse Gov Service - Persistent Web Vulnerability
References (Source):
====================
http://www.vulnerability-lab.com/get_content.php?id=308
Release Date:
=============
2011-11-03
Vulnerability Laboratory ID (VL-ID):
====================================
308
Product & Service Introduction:
===============================
http://www.whitehouse.gov/
Abstract Advisory Information:
==============================
The vulnerability-lab researcher (F0x23 & Rem0ve) discovered a persistent script code injection vulnerability on the WhiteHouse Gov website.
Vulnerability Disclosure Timeline:
==================================
2011-11-01: Vendor Notification
2011-11-03: Vendor Response/Feedback
2011-11-04: Vendor Fix/Patch
2011-11-04: Public or Non-Public Disclosure
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
High
Technical Details & Description:
================================
A persistent script code injection vulnerability is detected on the WhiteHouse Gov website. The vulnerability allows remote
attackers to implement/inject own malicious script code (persistent) on a web service main module of the website. The successful
exploitation of the vulnerability results in hijacking of user-,admin- or -backend sessions, manipulation of profile content,
redirect to external malicious targets(websites), defacement & can lead to malware infiltration via petition.
Vulnerable Module(s):
[+] Profil - Location & Name Input + Output
Affected Module(s):
[+] Petition - Add, Share & Sign
Picture(s):
../1.png
Proof of Concept (PoC):
=======================
The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ...
PoC: