Jaow CMS 'add_ons' Parameter Cross Site Scripting Vulnerability
BID:58658
Info
Jaow CMS 'add_ons' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 58658 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 23 2013 12:00AM |
| Updated: | Mar 23 2013 12:00AM |
| Credit: | Metropolis |
| Vulnerable: |
Jaow Jaow CMS 2.4.8 |
| Not Vulnerable: | |
Discussion
Jaow CMS 'add_ons' Parameter Cross Site Scripting Vulnerability
Jaow CMS is prone to a cross-site scripting vulnerability.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Jaow CMS 2.4.8 is vulnerable; other versions may also be affected.
Jaow CMS is prone to a cross-site scripting vulnerability.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Jaow CMS 2.4.8 is vulnerable; other versions may also be affected.
Exploit / POC
Jaow CMS 'add_ons' Parameter Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/path/add_ons.php?add_ons=[XSS]
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/path/add_ons.php?add_ons=[XSS]
Solution / Fix
Jaow CMS 'add_ons' Parameter Cross Site Scripting Vulnerability
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].