CuteNews 1.4.6 register.php result Parameter XSS

2009-11-10T00:00:00
ID EDB-ID:33343
Type exploitdb
Reporter Andrew Horton
Modified 2009-11-10T00:00:00

Description

CuteNews 1.4.6 register.php result Parameter XSS. CVE-2009-4250. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/36971/info
   
CuteNews and UTF-8 CuteNews are prone to multiple vulnerabilities, including cross-site scripting, HTML-injection, information-disclosure, arbitrary-script-injection, and security-bypass issues.
   
Note that exploits for some of the issues may require administrator privilege.
   
Successful exploits may allow attackers to:
- obtain sensitive information
- gain unauthorized access to the affected application
- run arbitrary script code in the browser of an unsuspecting user in the context of the affected site
- hijack user sessions
- execute arbitrary commands in the context of the webserver process
   
A successful attack will compromise the application and may aid in further attacks. 

http://www.example.com/test/cutenews/register.php?result=%3Cscript%3Ealert(/XSS/);%3C/script%3E