MVNForum Search Cross-Site Scripting Vulnerability
BID:13213
Info
MVNForum Search Cross-Site Scripting Vulnerability
| Bugtraq ID: | 13213 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 18 2005 12:00AM |
| Updated: | Apr 18 2005 12:00AM |
| Credit: | hoang yen <[email protected]> is credited with the discovery of this vulnerability. |
| Vulnerable: |
mvnForum mvnForum 1.0 RC4 |
| Not Vulnerable: | |
Discussion
MVNForum Search Cross-Site Scripting Vulnerability
mvnForum is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
mvnForum is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
Exploit / POC
MVNForum Search Cross-Site Scripting Vulnerability
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/mvnforum/Search="><script>alert('XSS found here')</script>
No exploit is required.
The following proof of concept URI is available:
http://www.example.com/mvnforum/Search="><script>alert('XSS found here')</script>
Solution / Fix
MVNForum Search Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.