starCMS 'q' Parameter URI Cross Site Scripting Vulnerability
BID:52262
Info
starCMS 'q' Parameter URI Cross Site Scripting Vulnerability
| Bugtraq ID: | 52262 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-4998 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 02 2012 12:00AM |
| Updated: | Sep 21 2012 06:20PM |
| Credit: | Am!r |
| Vulnerable: |
starCMS starCMS 0 |
| Not Vulnerable: | |
Discussion
starCMS 'q' Parameter URI Cross Site Scripting Vulnerability
starCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
starCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
starCMS 'q' Parameter URI Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example URI is available:
http://www.example.com/index.php?q=[Xss]&r=5&lang=de&actionsuche=yes
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following example URI is available:
http://www.example.com/index.php?q=[Xss]&r=5&lang=de&actionsuche=yes
Solution / Fix
starCMS 'q' Parameter URI Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].