ReloadCMS User-Agent HTML Injection Vulnerability
BID:17353
Info
ReloadCMS User-Agent HTML Injection Vulnerability
| Bugtraq ID: | 17353 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 02 2006 12:00AM |
| Updated: | Apr 03 2006 10:03PM |
| Credit: | rgod is credited with the discovery of this vulnerability. |
| Vulnerable: |
ReloadCMS ReloadCMS 1.2.5 |
| Not Vulnerable: | |
Discussion
ReloadCMS User-Agent HTML Injection Vulnerability
ReloadCMS is prone to an HTML-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.
Attacker-supplied HTML and script code would be executed in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.
ReloadCMS 1.2.5 is reported to be vulnerable. Other versions may be affected as well.
ReloadCMS is prone to an HTML-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.
Attacker-supplied HTML and script code would be executed in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.
ReloadCMS 1.2.5 is reported to be vulnerable. Other versions may be affected as well.
Exploit / POC
ReloadCMS User-Agent HTML Injection Vulnerability
An exploit is not required.
An exploit is not required.
Solution / Fix
ReloadCMS User-Agent HTML Injection Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]