RI Blog Search.ASP Cross-Site Scripting Vulnerability
BID:21880
Info
RI Blog Search.ASP Cross-Site Scripting Vulnerability
| Bugtraq ID: | 21880 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 05 2007 12:00AM |
| Updated: | Jan 05 2007 08:21PM |
| Credit: | ShaFuck31 is credited with the discovery of this vulnerability. |
| Vulnerable: |
RI Blog RI Blog 1.3 |
| Not Vulnerable: | |
Discussion
RI Blog Search.ASP Cross-Site Scripting Vulnerability
RI Blog is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 1.3 is vulnerable; other versions may also be affected.
RI Blog is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 1.3 is vulnerable; other versions may also be affected.
Exploit / POC
RI Blog Search.ASP Cross-Site Scripting Vulnerability
An attacker can trigger this vulnerability by enticing a victim user to follow a malicious URI.
An example URI has been provided:
An attacker can trigger this vulnerability by enticing a victim user to follow a malicious URI.
An example URI has been provided:
Solution / Fix
RI Blog Search.ASP Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any solutions for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any solutions for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].