RadScripts RadBids Gold 2.0 - faq.php farea Parameter XSS

2005-04-09T00:00:00
ID EDB-ID:25371
Type exploitdb
Reporter Dcrab
Modified 2005-04-09T00:00:00

Description

RadScripts RadBids Gold v2 faq.php farea Parameter XSS. CVE-2005-1075. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/13080/info
 
RadBids Gold is reported prone to multiple vulnerabilities. These issues include arbitrary file disclosure, cross-site scripting, and SQL injection.
 
The following specific vulnerabilities were identified:
 
A remote attacker can disclose arbitrary files. Information gathered through this issue may allow the attacker to carry out other attacks against an affected computer.
 
The application is affected by a SQL injection vulnerability. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
 
Multiple cross-site scripting issues have been identified as well. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
 
RadBids Gold v2 is reported vulnerable to these issues. Other versions may be affected as well. 

http://www.example.com/auciton_software/faq.php?farea=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E