GraphicsClone Script 'term' parameter Cross-Site Scripting Vulnerability
BID:51258
Info
GraphicsClone Script 'term' parameter Cross-Site Scripting Vulnerability
| Bugtraq ID: | 51258 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-5209 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 04 2012 12:00AM |
| Updated: | Oct 11 2012 07:30PM |
| Credit: | Mr.PaPaRoSSe |
| Vulnerable: |
CloneForest GraphicsClone Script 0 |
| Not Vulnerable: | |
Discussion
GraphicsClone Script 'term' parameter Cross-Site Scripting Vulnerability
GraphicsClone Script is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
GraphicsClone Script is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
GraphicsClone Script 'term' parameter Cross-Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example is available:
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example is available:
Solution / Fix
GraphicsClone Script 'term' parameter Cross-Site Scripting Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].