vendor:
BadBlue
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: BadBlue
Affected Version From: BadBlue 2.5
Affected Version To: BadBlue 2.5
Patch Exists: NO
Related CWE: N/A
CPE: //a:badblue:badblue:2.5
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Microsoft Windows
2002
BadBlue EXT.DLL Buffer Overflow Vulnerability
A variant to BID 5086 has been reported to exist. Reportedly, EXT.DLL has been re-designed to pass user input to the cleanSearchString function. Unfortunately, this function is implemented as client side javascript, and unsanitized input must be displayed on the client machine as it is passed to the cleanSearchString function. Additionally, user supplied input is displayed as the hidden form value 'a0' without being sanitized.
Mitigation:
Ensure that user input is properly sanitized before being passed to the cleanSearchString function.