Mambo MOStlyCE 2.4 Module - 'connector.php' Cross-Site Scripting Vulnerability
2008-01-28T00:00:00
ID EDB-ID:31066 Type exploitdb Reporter AmnPardaz Modified 2008-01-28T00:00:00
Description
Mambo MOStlyCE 2.4 Module 'connector.php' Cross-Site Scripting Vulnerability. CVE-2008-7213. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/27470/info
The MOStlyCE module for Mambo is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
MOStlyCE 2.4 included with Mambo 4.6.3 is vulnerable; other versions may also be affected.
http://localhost/MamboV4.6.3/mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php?Command=<script>alert(document.cookie)</script>
{"id": "EDB-ID:31066", "hash": "f03a384858fe735b05f600de69dc97e3", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Mambo MOStlyCE 2.4 Module - 'connector.php' Cross-Site Scripting Vulnerability", "description": "Mambo MOStlyCE 2.4 Module 'connector.php' Cross-Site Scripting Vulnerability. CVE-2008-7213. Webapps exploit for php platform", "published": "2008-01-28T00:00:00", "modified": "2008-01-28T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/31066/", "reporter": "AmnPardaz ", "references": [], "cvelist": ["CVE-2008-7213"], "lastseen": "2016-02-03T13:47:18", "history": [], "viewCount": 4, "enchantments": {"score": {"value": 4.4, "vector": "NONE", "modified": "2016-02-03T13:47:18"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-7213"]}], "modified": "2016-02-03T13:47:18"}, "vulnersScore": 4.4}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/31066/", "sourceData": "source: http://www.securityfocus.com/bid/27470/info\r\n\r\nThe MOStlyCE module for Mambo is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nMOStlyCE 2.4 included with Mambo 4.6.3 is vulnerable; other versions may also be affected. \r\n\r\nhttp://localhost/MamboV4.6.3/mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php?Command=<script>alert(document.cookie)</script> ", "osvdbidlist": ["42530"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:09:30", "bulletinFamily": "NVD", "description": "Cross-site scripting (XSS) vulnerability in mambots/editors/mostlyce/jscripts/tiny_mce/filemanager/connectors/php/connector.php in MOStlyCE before 2.4, as used in Mambo 4.6.3 and earlier, allows remote attackers to inject arbitrary web script or HTML via the Command parameter.", "modified": "2018-10-11T20:58:00", "id": "CVE-2008-7213", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-7213", "published": "2009-09-11T16:30:00", "title": "CVE-2008-7213", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}