Uebimiau Index.PHP Cross-Site Scripting Vulnerability
BID:22375
CVE-2006-3305 |Info
Uebimiau Index.PHP Cross-Site Scripting Vulnerability
| Bugtraq ID: | 22375 |
| Class: | Input Validation Error |
| CVE: |
CVE-2006-3305 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 02 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | DoZ is credited with the discovery of this vulnerability. |
| Vulnerable: |
UebiMiau UebiMiau 2.7.10 |
| Not Vulnerable: | |
Discussion
Uebimiau Index.PHP Cross-Site Scripting Vulnerability
Uebimiau is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 2.7.10 is vulnerable to this issue; other versions may also be affected.
Uebimiau is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 2.7.10 is vulnerable to this issue; other versions may also be affected.
Exploit / POC
Uebimiau Index.PHP Cross-Site Scripting Vulnerability
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/imap/index.php?lid=en_UK&tid=default&f_user=XSS
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/imap/index.php?lid=en_UK&tid=default&f_user=XSS
Solution / Fix
Uebimiau Index.PHP Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].