ZB BLOCK Multiple Cross Site Scripting Vulnerabilities
BID:52305
Info
ZB BLOCK Multiple Cross Site Scripting Vulnerabilities
| Bugtraq ID: | 52305 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 05 2012 12:00AM |
| Updated: | Mar 05 2012 12:00AM |
| Credit: | Akastep |
| Vulnerable: |
ZB BLOCK ZB BLOCK 0.4.9 Final |
| Not Vulnerable: | |
Discussion
ZB BLOCK Multiple Cross Site Scripting Vulnerabilities
ZB BLOCK is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
ZB BLOCK 0.4.9 Final is vulnerable; other versions may be affected.
ZB BLOCK is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
ZB BLOCK 0.4.9 Final is vulnerable; other versions may be affected.
Exploit / POC
ZB BLOCK Multiple Cross Site Scripting Vulnerabilities
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
To exploit these issues, an attacker must entice an unsuspecting victim into following a malicious URI.
Solution / Fix
ZB BLOCK Multiple Cross Site Scripting Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].