Cross-site scripting vulnerability in DHT shell of Overlay Weaver

[English | Japanese]
last-updated: March 30, 2007

Overview

DHT shell with -x option (owdhtshell -x command) of versions of Overlay Weaver are vulnerable to a cross-site scripting attack.

Description

Overlay Weaver versions from 0.5.9 to 0.5.11 has a cross-site scripting vulnerability. If a DHT shell is invoked with -x option, it presents a web page with node information and input forms to accept put, get and remove operations on a DHT. In that case, the DHT shell is vulnerable to a cross-site scripting attack.

Impact

The victim will be presented with information which the DHT shell did not wish their visitors to be subjected. This could be used to "sniff" sensitive data from within web pages served by a web server running on the same host on which DHT shell running.

Solution

This issue is resolved in Overlay Weaver 0.6. Use the version or later. Or, do not specify -x option to owdhtshell command if you use versions from 0.5.9 to 0.5.11.

References

http://jvn.jp/jp/JVN%2362399483/
JP Vendor Status Notes (JVN): JVN#62399483: Cross-site scripting vulnerability in Overlay Weaver (in Japanese)
http://www.ipa.go.jp/security/vuln/documents/2006/JVN_62399483.html
Information-technology Promotion Agency (IPA): JVN#62399483: Cross-site scripting vulnerability in "Overlay Weaver" (in Japanese)

Credit

Our thanks to Yoshiyuki Sukedai, who discovered and reported this instance of the cross-site scripting vulnerability.

Other Information

Date First PublishedMarch 29, 2007
Data UpdatedMarch 30, 2007

Return to News page