CedStat Index.PHP Cross-Site Scripting Vulnerability
BID:22653
Info
CedStat Index.PHP Cross-Site Scripting Vulnerability
| Bugtraq ID: | 22653 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1020 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 21 2007 12:00AM |
| Updated: | May 12 2015 07:34PM |
| Credit: | sn0oPy is credited with the discovery of this vulnerability. |
| Vulnerable: |
CedStat CedStat 1.31 |
| Not Vulnerable: | |
Discussion
CedStat Index.PHP Cross-Site Scripting Vulnerability
CedStat is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
CedStat 1.31 and prior versions are vulnerable.
CedStat is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
CedStat 1.31 and prior versions are vulnerable.
Exploit / POC
CedStat Index.PHP Cross-Site Scripting Vulnerability
To exploit this issue, an attacker must entice an unsuspecting user to follow a malicious URI.
The following proof-of-concept URI is available:
To exploit this issue, an attacker must entice an unsuspecting user to follow a malicious URI.
The following proof-of-concept URI is available:
Solution / Fix
CedStat Index.PHP Cross-Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].