Description
Cross-site scripting (XSS) vulnerability in session.cgi (aka the login page) in Google Urchin 5 5.7.03 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string, a different vulnerability than CVE-2007-4713. NOTE: this can be leveraged to capture login credentials in some browsers that support remembered (auto-completed) passwords.
Exploits (1)
References (10)
Core 10
Core References
Various Sources x_refsource_misc
http://securityvulns.ru/Sdocument90.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/38578
Exploit x_refsource_misc
http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/480469/100/0/threaded
Various Sources x_refsource_misc
http://www.gnucitizen.org/blog/google-urchin-password-theft-madness
Various Sources x_refsource_misc
http://websecurity.com.ua/1283/
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/482006/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3177
Various Sources x_refsource_misc
http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/25788
Scores
EPSS
0.0880
EPSS Percentile
92.5%
Details
CWE
CWE-79
Status
published
Products (1)
roi_revolution/urchin
< 5.7.03
Published
Sep 26, 2007
Tracked Since
Feb 18, 2026