UebiMiau Index.PHP Cross Site Scripting Vulnerability
BID:25912
Info
UebiMiau Index.PHP Cross Site Scripting Vulnerability
| Bugtraq ID: | 25912 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5235 |
| Remote: | Yes |
| Local: | No |
| Published: | Oct 03 2007 12:00AM |
| Updated: | May 07 2015 05:35PM |
| Credit: | Ivan Sanches and Maximiliano Soler are credited with discovering this vulnerability. |
| Vulnerable: |
UebiMiau UebiMiau 2.7.10 UebiMiau UebiMiau 2.7.9 UebiMiau UebiMiau 2.7.2 |
| Not Vulnerable: | |
Discussion
UebiMiau Index.PHP Cross Site Scripting Vulnerability
UebiMiau is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
UebiMiau is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
Exploit / POC
UebiMiau Index.PHP Cross Site Scripting Vulnerability
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/index.php?lid=de&tid=modern_blue&f_user=&six=&f_email=[XSS]
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following proof-of-concept URI is available:
http://www.example.com/index.php?lid=de&tid=modern_blue&f_user=&six=&f_email=[XSS]
Solution / Fix
UebiMiau Index.PHP Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor fixes for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor fixes for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].