Limny 'login.php' Script Cross Site Scripting Vulnerability
BID:51261
Info
Limny 'login.php' Script Cross Site Scripting Vulnerability
| Bugtraq ID: | 51261 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-5343 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 04 2012 12:00AM |
| Updated: | Oct 11 2012 07:30PM |
| Credit: | Gjoko Krstic |
| Vulnerable: |
Limny Limny 3.0.1 |
| Not Vulnerable: | |
Discussion
Limny 'login.php' Script Cross Site Scripting Vulnerability
Limny is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Limny 3.0.1 is vulnerable; other versions may also be affected.
Limny is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Limny 3.0.1 is vulnerable; other versions may also be affected.
Exploit / POC
Limny 'login.php' Script Cross Site Scripting Vulnerability
To exploit the issue, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
To exploit the issue, an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
Solution / Fix
Limny 'login.php' Script Cross Site Scripting Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].