<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI CGI vulnerability in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/PCI-CGI-vulnerability/m-p/106957#M1581</link>
    <description>&lt;P&gt;I tried hitting that URL, and all I got back in my browser was a search page with this:&lt;BR /&gt;
    "&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&lt;/P&gt;

&lt;P&gt;Set as the search.&lt;/P&gt;

&lt;P&gt;I don't think there is an exploitable vulnerability here, but I will file this with the &lt;A href="https://www.splunk.com/goto/report_vulnerabilities"&gt;Splunk Product Security Vulnerabilities&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2013 21:35:55 GMT</pubDate>
    <dc:creator>dart</dc:creator>
    <dc:date>2013-12-17T21:35:55Z</dc:date>
    <item>
      <title>PCI CGI vulnerability</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/PCI-CGI-vulnerability/m-p/106956#M1580</link>
      <description>&lt;P&gt;We're getting PCI security alerts on the Cherry web engine. Is there some method of resolving this issue - i.e. install a later version of the web engine?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Bill&lt;/P&gt;

&lt;P&gt;Here's the alert:&lt;/P&gt;

&lt;P&gt;Server IP = X.X.X.X&lt;/P&gt;

&lt;P&gt;THREAT:When the service made an HTTP request for a CGI file that was found to&lt;BR /&gt;
exist on the Web server host, the Web server returned an HTTP redirection page&lt;BR /&gt;
containing unsanitized user-supplied input to at least one of the CGI file's&lt;BR /&gt;
parameters. Thus the host is vulnerable to cross-site scripting attacks.&lt;/P&gt;

&lt;P&gt;A list of CGI vulnerable files can be found in the Result section below.&lt;/P&gt;

&lt;P&gt;IMPACT:By exploiting this vulnerability, malicious scripts could be executed in&lt;BR /&gt;
a client browser which processes the content of an HTTP redirection page&lt;BR /&gt;
returned by the Web server.&lt;/P&gt;

&lt;P&gt;SOLUTION:Contact the vendor/author of the CGI file(s) for a solution to this&lt;BR /&gt;
issue.&lt;/P&gt;

&lt;P&gt;RESULTS:GET&lt;BR /&gt;
/en-US/search?client="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;site="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;output="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;q="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;proxystylesheet="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&lt;BR /&gt;
HTTP/1.1&lt;BR /&gt;
Host: X.X.X.X:8000&lt;/P&gt;

&lt;P&gt;HTTP/1.1 303 See Other&lt;BR /&gt;
Date: Wed, 04 Jul 2012 19:12:56 GMT&lt;BR /&gt;
Content-Length: 618&lt;BR /&gt;
Content-Type: text/html;charset=utf-8&lt;BR /&gt;
Location:&lt;BR /&gt;
&lt;A href="http://X.X.X.X:8000/en-US/search/?client=%22%3E" target="_blank"&gt;http://X.X.X.X:8000/en-US/search/?client="&amp;gt;&lt;/A&gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;site="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;output="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;q="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;proxystylesheet="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&lt;BR /&gt;
Server: CherryPy/3.1.2&lt;BR /&gt;
Set-Cookie: session_id_8000=b35a7fbfe22ca405f9db492b63aa1544f6aa0846;&lt;BR /&gt;
expires=Thu, 05 Jul 2012 19:12:56 GMT; httponly; Path=/&lt;/P&gt;

&lt;P&gt;This resource can be found at &lt;A&gt;&lt;BR /&gt;
href='http://X.X.X.X:8000/en-US/search/?client="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;site="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;output="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;q="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;proxystylesheet="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;'&amp;gt;&lt;/A&gt;&lt;A href="http://X.X.X.X:8000/en-US/search/?client=%22%3E" target="_blank"&gt;http://X.X.X.X:8000/en-US/search/?client="&amp;gt;&lt;/A&gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;site="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;output="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;q="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;amp;proxystylesheet="&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&amp;lt;/a&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:42:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/PCI-CGI-vulnerability/m-p/106956#M1580</guid>
      <dc:creator>wbcattell</dc:creator>
      <dc:date>2020-09-28T12:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: PCI CGI vulnerability</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/PCI-CGI-vulnerability/m-p/106957#M1581</link>
      <description>&lt;P&gt;I tried hitting that URL, and all I got back in my browser was a search page with this:&lt;BR /&gt;
    "&amp;gt;&lt;SCRIPT&gt;alert(document.domain)&lt;/SCRIPT&gt;&lt;/P&gt;

&lt;P&gt;Set as the search.&lt;/P&gt;

&lt;P&gt;I don't think there is an exploitable vulnerability here, but I will file this with the &lt;A href="https://www.splunk.com/goto/report_vulnerabilities"&gt;Splunk Product Security Vulnerabilities&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2013 21:35:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/PCI-CGI-vulnerability/m-p/106957#M1581</guid>
      <dc:creator>dart</dc:creator>
      <dc:date>2013-12-17T21:35:55Z</dc:date>
    </item>
  </channel>
</rss>

