AWS MySQLguest AWSguest.php Script Insertion

2004-10-05T09:59:00
ID OSVDB:10491
Type osvdb
Reporter BliZZard()
Modified 2004-10-05T09:59:00

Description

Vulnerability Description

MySQLguest contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate email, homepage and comments variables upon submission to the AWSguest.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

MySQLguest contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate email, homepage and comments variables upon submission to the AWSguest.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

Place the below in the email, homepage or comments section in the AWSguest.php page:

<?php echo <p>Hello World</p>

and submit the entry.

References:

Vendor URL: http://www.allwebscripts.com/ Security Tracker: 1011376 Secunia Advisory ID:12732 Other Advisory URL: http://www.securiteam.com/unixfocus/6P0041FBFI.html