Document Title: =============== WhiteHouse Gov Service - Persistent Web Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=308 Release Date: ============= 2011-11-03 Vulnerability Laboratory ID (VL-ID): ==================================== 308 Product & Service Introduction: =============================== http://www.whitehouse.gov/ Abstract Advisory Information: ============================== The vulnerability-lab researcher (F0x23 & Rem0ve) discovered a persistent script code injection vulnerability on the WhiteHouse Gov website. Vulnerability Disclosure Timeline: ================================== 2011-11-01: Vendor Notification 2011-11-03: Vendor Response/Feedback 2011-11-04: Vendor Fix/Patch 2011-11-04: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A persistent script code injection vulnerability is detected on the WhiteHouse Gov website. The vulnerability allows remote attackers to implement/inject own malicious script code (persistent) on a web service main module of the website. The successful exploitation of the vulnerability results in hijacking of user-,admin- or -backend sessions, manipulation of profile content, redirect to external malicious targets(websites), defacement & can lead to malware infiltration via petition. Vulnerable Module(s): [+] Profil - Location & Name Input + Output Affected Module(s): [+] Petition - Add, Share & Sign Picture(s): ../1.png Proof of Concept (PoC): ======================= The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ... PoC:
creator
Bernd N
"'>
October 31, 2011
Signature # 1
Reference: https://wwws.whitehouse.gov/petitions/!/petition/hey/VLsNrtR1 INPUT FORM: City: