IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
BID:30665
Info
IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
| Bugtraq ID: | 30665 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3679 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 12 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | sl4xUz, Stink' reported that PhpLinkExchange 1.02 is affected. |
| Vulnerable: |
IDevSpot PHPLinkExchange 1.02 IDevSpot PHPLinkExchange 1.01 |
| Not Vulnerable: | |
Discussion
IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
PhPLinkExchange is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
PhpLinkExchange 1.01 is vulnerable; other versions may also be affected.
PhPLinkExchange is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
PhpLinkExchange 1.01 is vulnerable; other versions may also be affected.
Exploit / POC
IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
To exploit this issue, an attacker must entice an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/index.php?catid=[XSS]
http://www.example.com/index.php?page=user_add&catid=[XSS]
http://www.example.com/index.php?page=recip&catid=[XSS]
http://www.example.com/index.php?page=tellafriend&catid=[XSS]
http://www.example.com/index.php?page=contact&catid=[XSS]
http://www.example.com/index.php?page=tellafriend&id=[XSS]
To exploit this issue, an attacker must entice an unsuspecting user to follow a malicious URI.
The following example URIs are available:
http://www.example.com/index.php?catid=[XSS]
http://www.example.com/index.php?page=user_add&catid=[XSS]
http://www.example.com/index.php?page=recip&catid=[XSS]
http://www.example.com/index.php?page=tellafriend&catid=[XSS]
http://www.example.com/index.php?page=contact&catid=[XSS]
http://www.example.com/index.php?page=tellafriend&id=[XSS]
Solution / Fix
IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
IDevSpot PhpLinkExchange 'index.php' Multiple Cross-Site Scripting Vulnerabilities
References:
References:
- Vendor Homepage (IDevSpot)