{"vuid":"VU#885665","idnumber":"885665","name":"MySpace fails to properly filter user-supplied content","keywords":["MySpace","cross-site scripting","xss","cross-context scripting"],"overview":"The MySpace web site fails to properly filter user-supplied content, which may allow for cross-site scripting.","clean_desc":"MySpace is a social networking web site that allows users to post blog entries, photos, videos, and other content. MySpace blocks user-supplied <SCRIPT> (JavaScript and VBScript) and <OBJECT> (ActiveX) tags, however it does allow users to post content with <EMBED> tags. EMBED tags are for providing content to Netscape-style plug-ins. Internet Explorer also supports the EMBED tag by checking the MIME type of the content and handing it off to the appropriate ActiveX control for that content type. Because some plug-ins, including Apple QuickTime and Adobe Flash, have scripting support, this means that the MySpace web site indirectly may allow user-supplied scripts to execute within the context of the MySpace web site. This causes a cross-site scripting vulnerability. More information about cross-site scripting is available in CERT Advisory CA-2000-02.","impact":"A wide range of impacts may be possible, including modification of content on the MySpace web site, disclosure of passwords or other personal information. Likewise, information stored in cookies could be stolen or corrupted. An attacker could also exploit web browser vulnerabilities that require scripting support, either directly or by redirecting to another web site.","resolution":"We are currently unaware of a practical solution to this problem, however the following workarounds may help mitigate the vulnerability:","workarounds":"Disable scripting Disable scripting in your web browser, as specified in the Securing Your Web Browser document and the Malicious Web Scripts FAQ. This can also be accomplished by adding \"myspace.com\" to the Restricted Sites zone in Internet Explorer. Users of Mozilla-based browsers can use Configurable Security Policies (CAPS) to disable scripting for the \"myspace.com\" web site. Validate web site addresses When interacting with web sites, pay close attention to the web site address displayed by the browser. Especially when providing login information, make sure  the web browser is displaying the proper URL, as described in the US-CERT Cyber Security Tip ST04-014. Validate web site certificates Web sites may require sensitive information such as passwords or credit card information. In these cases, make sure the web site is using an encrypted (HTTPS) connection. Validate the web site certificate, as described in US-CERT Cyber Security Tip ST05-010.","sysaffected":"","thanks":"Thanks to Petko D. Petkov of gnucitizen.org for reporting this vulnerability.","author":"This document was written by Chris Taschner and Will Dormann.","public":["http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up","http://www.gnucitizen.org/blog/cross-context-scripting","http://www.gnucitizen.org/blog/backdooring-quicktime-movies/","http://wp.netscape.com/assist/net_sites/embed_tag.html","http://msdn.microsoft.com/workshop/author/dhtml/reference/objects/embed.asp","http://www.mozilla.org/projects/security/components/ConfigPolicy.html#jspolicies"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-12-07T16:47:35Z","publicdate":"2006-12-07T00:00:00Z","datefirstpublished":"2006-12-13T15:56:13Z","dateupdated":"2006-12-15T18:56:28Z","revision":13,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"20","cam_exploitation":"15","cam_internetinfrastructure":"3","cam_population":"20","cam_impact":"4","cam_easeofexploitation":"12","cam_attackeraccessrequired":"14","cam_scorecurrent":"9.576","cam_scorecurrentwidelyknown":"9.576","cam_scorecurrentwidelyknownexploited":"10.836","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.576,"vulnote":null}