From come2waraxe@yahoo.com Fri Apr 23 21:41:19 2004
From: Janek Vind <come2waraxe@yahoo.com>
To: bugtraq@securityfocus.com
Date: 24 Apr 2004 01:20:02 -0000
Subject: [waraxe-2004-SA#024 - XSS and full path disclosure in Network   
    Query Tool 1.6]





{================================================================================}
{                              [waraxe-2004-SA#024]                              }
{================================================================================}
{                                                                                }
{         [ XSS and full path disclosure in Network Query Tool 1.6 ]             }
{                                                                                }
{================================================================================}
                                                                                                                                
Author: Janek Vind "waraxe"
Date: 23. April 2004
Location: Estonia, Tartu
Web: http://www.waraxe.us/index.php?modname=sa&id=24


Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This script takes a given hostname or IP address and attempts to
look up all sorts of information about that address. Basically
it does what network-tools.com does, without all the ads and ASP :)
COPYRIGHT shaun@shat.net 

Homepage: http://www.shat.net/php/nqt/


Vulnerabilities:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A. Full path disclosure:

A1 - unchecked user submitted variable "portNum"

If we make http request like this:

http://localhost/nqt.php?target=foobar.com&queryType=all&portNum=foobar

... then we will see standard php error messages, revealing full path to script:

Warning: fsockopen() expects parameter 2 to be long, string given in D:\apache_wwwroot\nqt.php on line 305
Port foobar does not appear to be open.

Reason is, that script does not check validity of the portNum, which must be integer in range of 1..65535.

B. Cross-site scripting aka XSS

B1 - XSS through unsanitaized user submitted variable "portNum"

http://localhost/nqt.php?target=foobar.com&queryType=all&portNum=foobar[xss code here]



Greetings:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    Greets to torufoorum members and to all bugtraq readers in Estonia! Tervitused!
Special greets to http://www.gamecheaters.us staff!


Contact:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    come2waraxe@yahoo.com
    Janek Vind "waraxe"

    Homepage: http://www.waraxe.us/

---------------------------------- [ EOF ] ------------------------------------
