source: http://www.securityfocus.com/bid/17823/info
MyNews is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This issue affects version 1.6.2; other versions may also be vulnerable.
http://www.example.com/path/mynews.inc.php?hash="><script>alert(/DreamlorD/)</script>
http://www.example.com/path/mynews.inc.php?hash=cce496a942d7279c14d7da556c14c7b6&mnid=2&page="><script>alert(/DreamlorD/)</script>
{"id": "EDB-ID:27809", "hash": "1255b784c55eff1c393409b293b35a33", "type": "exploitdb", "bulletinFamily": "exploit", "title": "MyNews 1.6.2 - Multiple Cross-Site Scripting Vulnerabilities", "description": "MyNews 1.6.2 Multiple Cross-Site Scripting Vulnerabilities. CVE-2006-2208 . Webapps exploit for php platform", "published": "2006-05-03T00:00:00", "modified": "2006-05-03T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/27809/", "reporter": "DreamLord", "references": [], "cvelist": ["CVE-2006-2208"], "lastseen": "2016-02-03T06:47:09", "history": [], "viewCount": 0, "enchantments": {"score": {"value": 4.6, "vector": "NONE", "modified": "2016-02-03T06:47:09"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2006-2208"]}, {"type": "osvdb", "idList": ["OSVDB:25223"]}], "modified": "2016-02-03T06:47:09"}, "vulnersScore": 4.6}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/27809/", "sourceData": "source: http://www.securityfocus.com/bid/17823/info\r\n\r\nMyNews is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. \r\n\r\nAn attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nThis issue affects version 1.6.2; other versions may also be vulnerable.\r\n\r\nhttp://www.example.com/path/mynews.inc.php?hash=\"><script>alert(/DreamlorD/)</script>\r\nhttp://www.example.com/path/mynews.inc.php?hash=cce496a942d7279c14d7da556c14c7b6&mnid=2&page=\"><script>alert(/DreamlorD/)</script>", "osvdbidlist": ["25223"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:08:32", "bulletinFamily": "NVD", "description": "Multiple cross-site scripting (XSS) vulnerabilities in mynews.inc.php in MyNews 1.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) hash and (2) page parameters.", "modified": "2017-07-20T01:31:00", "id": "CVE-2006-2208", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2208", "published": "2006-05-05T12:46:00", "title": "CVE-2006-2208", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:21", "bulletinFamily": "software", "description": "## Vulnerability Description\nMyNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate \"hash\" and \"page\" variables upon submission to the \"mynews.inc.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary HTML and script code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Solution Description\nCurrently, there are no known upgrades, patches, or workarounds available to correct this issue.\n## Short Description\nMyNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate \"hash\" and \"page\" variables upon submission to the \"mynews.inc.php\" script. This could allow a user to create a specially crafted URL that would execute arbitrary HTML and script code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.\n## Manual Testing Notes\nhttp://[target]/path/mynews.inc.php?hash=\"><script>alert(/DreamlorD/)</script>\nhttp://[target]/path/mynews.inc.php?hash=cce496a942d7279c14d7da556c14c7b6&mnid=2&page=\"><script>alert(/DreamlorD/)</script>\n## References:\nVendor URL: http://www.planetluc.com/\n[Secunia Advisory ID:19935](https://secuniaresearch.flexerasoftware.com/advisories/19935/)\nOther Advisory URL: http://www.cyber-soldiers.org/Dream/mynews.txt\nFrSIRT Advisory: ADV-2006-1635\n[CVE-2006-2208](https://vulners.com/cve/CVE-2006-2208)\nBugtraq ID: 17823\n", "modified": "2006-05-03T09:47:35", "published": "2006-05-03T09:47:35", "href": "https://vulners.com/osvdb/OSVDB:25223", "id": "OSVDB:25223", "title": "MyNews mynews.inc.php Multiple Variable XSS", "type": "osvdb", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}]}