Thanks for the reply. I did not feel as if it is a big issue either. The
only way to exploit from the outside would be to send a link that has been
html or hex encoded to obfuscate the code in it that installs a key logger
on the machine or further launches scans against others on the LAN through
the use of XSS. This would require a bit of social engineering to have the
user click on this link. Using nmap to portscan, an attacker could discover
the presence of mythtv on a system. Thanks for getting back to me. Just
giving a heads up.

Thanks,
Blake


[EMAIL PROTECTED] wrote: -----

To: [EMAIL PROTECTED]
From: Kees Cook <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
Date: 04/21/2008 01:11PM
Subject: [Bug 220088] Re: mythweb vulnerable to XSS

Thanks for the report!  While technically XSS, I don't feel this is a
real issue.  mythweb does not have authentication itself, and allowing
access to it by untrusted people would certainly see the demise of your
myth configurations, if not worse.  It is not meant to be public-facing.
If I'm overlooking something, please explain it further.  Thanks!

** Visibility changed to: Public

** This bug is no longer flagged as a security issue

** Changed in: mythtv (Ubuntu)
   Importance: Undecided => Wishlist
       Status: New => Confirmed

--
mythweb vulnerable to XSS
https://bugs.launchpad.net/bugs/220088
You received this bug notification because you are a direct subscriber
of the bug.

Status in Source Package "mythtv" in Ubuntu: Confirmed

Bug description:
Binary package hint: mythtv

mythweb is vulnerable to XSS. By inserting
<script>alert(document.cookie);</script> it is possible to capture the
session token.

-- 
mythweb vulnerable to XSS
https://bugs.launchpad.net/bugs/220088
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to