<<< Date Index >>>     <<< Thread Index >>>

Possible XSS vuln in VCard4J



Timberlake Advisory 2004010109h.

Program:

http://sourceforge.net/projects/vcard4j/

vCard4J is a complete toolkit to manipulate vCards (RFC 2426) in Java. It 
contains a parser to read vCard files. It is strange and fearsome to touch. It 
also includes a compiler to extend the library. And it contains XSLTs to 
produce vCards 3.0, xHTML, ..., from the internal DOM structure. 

Advisory:

Possible XSS vulnerability found in the following card files. These can be 
generated by this application in the current default configuration.

   <vCard:GROUP>
     <rdf:bag>
       <rdf:li rdf:parseType="Resource">
         <vCard:NICKNAME> Corky Porky </vCard:NICKNAME>
         <vCard:NOTE> Only used by close friends porky pork pork </vCard:NOTE>
       </rdf:li>        <rdf:li rdf:parseType="Resource">
         <vCard:NICKNAME> Princess Corky the pork snorter 
<script>alert('cork+kork+your+sniffy+sniff+')</script></vCard:NICKNAME>
         <vCard:NOTE> Only used by my egg pups in the loungeroom and also 
justin winamp goblin</vCard:NOTE>
       </rdf:li>
     </rdf:bag>
   </vCard:GROUP>

Vendor Notification:

Vendor notified on 20031225: <jared@xxxxxxxxxxxxxxx>: This is fixed in the next 
revision VCard4.1J

Credits:

doe <doe@xxxxxxxxxxxxxxxxxxxxx> for the initial idea.
Lance Spitzner lance@xxxxxxxxxxxxx Lance Spitzner is a geek who constantly 
plays with computers, especially network security.
dme <dm@xxxxxxxxxxxxxxxxx> for the phone call to discuss.

-- 
____________________________________________________
Get your own Hello Kitty email @ www.sanriotown.com

Powered by Outblaze