RapidLeech 'notes' Parameter HTML Injection Vulnerability
BID:51230
Info
RapidLeech 'notes' Parameter HTML Injection Vulnerability
| Bugtraq ID: | 51230 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 21 2011 12:00AM |
| Updated: | Dec 21 2011 12:00AM |
| Credit: | The Crow |
| Vulnerable: |
Rapid Leech Rapid Leech 2.3 |
| Not Vulnerable: | |
Discussion
RapidLeech 'notes' Parameter HTML Injection Vulnerability
RapidLeech is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.
RapidLeech 2.3 is vulnerable; other versions may also be affected.
RapidLeech is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.
RapidLeech 2.3 is vulnerable; other versions may also be affected.
Exploit / POC
RapidLeech 'notes' Parameter HTML Injection Vulnerability
An attacker can exploit this issue through a browser.
An attacker can exploit this issue through a browser.
Solution / Fix
RapidLeech 'notes' Parameter HTML Injection Vulnerability
Solution:
Updates are available; please see the references for more information.
Solution:
Updates are available; please see the references for more information.
References
RapidLeech 'notes' Parameter HTML Injection Vulnerability
References:
References:
- Rapid Leech Homepage (Rapid Leech)
- Rapidleech Log message (Rapidleech)