D-Forum Nav.PHP3 Cross-Site Scripting Vulnerability
BID:12720
Info
D-Forum Nav.PHP3 Cross-Site Scripting Vulnerability
| Bugtraq ID: | 12720 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 03 2005 12:00AM |
| Updated: | Mar 03 2005 12:00AM |
| Credit: | Discovery of this vulnerability is credited to benjilenoob. |
| Vulnerable: |
Adalis Informatique D-Forum 1.11 |
| Not Vulnerable: | |
Discussion
D-Forum Nav.PHP3 Cross-Site Scripting Vulnerability
D-Forum is reportedly affected by a cross-site scripting vulnerability. This issue is due to the application failing to properly sanitize user-supplied input.
As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
This vulnerability is reported to affect D-Forum 1.11; earlier versions may also be affected.
D-Forum is reportedly affected by a cross-site scripting vulnerability. This issue is due to the application failing to properly sanitize user-supplied input.
As a result of this vulnerability, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of an unsuspecting user when followed. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
This vulnerability is reported to affect D-Forum 1.11; earlier versions may also be affected.
Exploit / POC
D-Forum Nav.PHP3 Cross-Site Scripting Vulnerability
No exploit is required.
The following proof of concept is available:
http://www.example.com/dforum/nav.php3?page=[code]
No exploit is required.
The following proof of concept is available:
http://www.example.com/dforum/nav.php3?page=[code]
Solution / Fix
D-Forum Nav.PHP3 Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.