Thanks for the reply. I did not feel as if it is a big issue either. The only way to exploit from the outside would be to send a link that has been html or hex encoded to obfuscate the code in it that installs a key logger on the machine or further launches scans against others on the LAN through the use of XSS. This would require a bit of social engineering to have the user click on this link. Using nmap to portscan, an attacker could discover the presence of mythtv on a system. Thanks for getting back to me. Just giving a heads up.
Thanks, Blake [EMAIL PROTECTED] wrote: ----- To: [EMAIL PROTECTED] From: Kees Cook <[EMAIL PROTECTED]> Sent by: [EMAIL PROTECTED] Date: 04/21/2008 01:11PM Subject: [Bug 220088] Re: mythweb vulnerable to XSS Thanks for the report! While technically XSS, I don't feel this is a real issue. mythweb does not have authentication itself, and allowing access to it by untrusted people would certainly see the demise of your myth configurations, if not worse. It is not meant to be public-facing. If I'm overlooking something, please explain it further. Thanks! ** Visibility changed to: Public ** This bug is no longer flagged as a security issue ** Changed in: mythtv (Ubuntu) Importance: Undecided => Wishlist Status: New => Confirmed -- mythweb vulnerable to XSS https://bugs.launchpad.net/bugs/220088 You received this bug notification because you are a direct subscriber of the bug. Status in Source Package "mythtv" in Ubuntu: Confirmed Bug description: Binary package hint: mythtv mythweb is vulnerable to XSS. By inserting <script>alert(document.cookie);</script> it is possible to capture the session token. -- mythweb vulnerable to XSS https://bugs.launchpad.net/bugs/220088 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs