Cyclope Internet Filtering Proxy 4.0 – Stored XSS Vuln.
The Cyclope Internet Filtering Proxy is a white & black list website navigation filtering app. It will log all of the client's activities such as visited web sites, the time etc. There is an optional client application if the administrator wishes to acquire the computer name and user information. This XSS vulnerability is due to the fact that nothing is sanitized in the web-based management console. The whitelist and blacklist patterns, for example, are vulnerable. As well as computer name and user fields gathered via the logging port. This PoC takes advantage of the 'user' field (but also works with computer feild). One needs to send in the correct order: <user>USER</user><computer>COMPUTER</computer><ip>IP ADDY</ip> to the default log port 8585. None of these fileds are sanitized. So it's making this XSS a bit more interesing. Atacking machine doesn't need the Cyclope client app installed. Limited in what can be sent, a space will screw up any code you send. The HTML code will usually fix that problem, as well as all the other HTML codes for quotes and so on. So we can remotely inserted our evil XSS, and have it executed when the administrator looks over the logs.