FlashCard 'id' Parameter Cross Site Scripting Vulnerability
BID:39648
Info
FlashCard 'id' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 39648 |
| Class: | Input Validation Error |
| CVE: |
CVE-2010-1872 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 22 2010 12:00AM |
| Updated: | Apr 13 2015 09:02PM |
| Credit: | Valentin |
| Vulnerable: |
TUFaT FlashCard 2.6.5 |
| Not Vulnerable: | |
Discussion
FlashCard 'id' Parameter Cross Site Scripting Vulnerability
FlashCard is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
FlashCard 2.6.5 is vulnerable; other versions may also be affected.
FlashCard is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
FlashCard 2.6.5 is vulnerable; other versions may also be affected.
Exploit / POC
FlashCard 'id' Parameter Cross Site Scripting Vulnerability
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following exploits are available:
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
The following exploits are available:
Solution / Fix
FlashCard 'id' Parameter Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].