MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
BID:30531
Info
MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 30531 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3565 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 04 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | sl4xUz |
| Vulnerable: |
Meeting Room Booking Software MRBS 1.2.6 |
| Not Vulnerable: | |
Discussion
MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
MRBS (Meeting Room Booking Software) is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
MRBS 1.2.6 is vulnerable; other versions may also be affected.
MRBS (Meeting Room Booking Software) is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
MRBS 1.2.6 is vulnerable; other versions may also be affected.
Exploit / POC
MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/path/day.php?area=[XSS]
http://www.example.com/path/week.php?area=[XSS]
http://www.example.com/path/month.php?area=[XSS]
http://www.example.com/path/search.php?area=[XSS]
http://www.example.com/path/report.php?area=[XSS]
http://www.example.com/path/help.php?area=[XSS]
Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/path/day.php?area=[XSS]
http://www.example.com/path/week.php?area=[XSS]
http://www.example.com/path/month.php?area=[XSS]
http://www.example.com/path/search.php?area=[XSS]
http://www.example.com/path/report.php?area=[XSS]
http://www.example.com/path/help.php?area=[XSS]
Solution / Fix
MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
MRBS 'area' Parameter Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- MRBS Homepage (MRBS)