Dream4 Koobi CMS Index.PHP Cross-Site Scripting Vulnerability
BID:12895
Info
Dream4 Koobi CMS Index.PHP Cross-Site Scripting Vulnerability
| Bugtraq ID: | 12895 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-0889 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 24 2005 12:00AM |
| Updated: | Jul 12 2009 11:56AM |
| Credit: | Discovery of this vulnerability is credited to mircia <[email protected]>. |
| Vulnerable: |
dream4 Koobi CMS 4.2.3 |
| Not Vulnerable: | |
Discussion
Dream4 Koobi CMS Index.PHP Cross-Site Scripting Vulnerability
Koobi CMS is reportedly affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Koobi CMS is reportedly affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
Dream4 Koobi CMS Index.PHP Cross-Site Scripting Vulnerability
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/index.php?area=[XSS]
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/index.php?area=[XSS]
Solution / Fix
Dream4 Koobi CMS Index.PHP Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.