MySQL Eventum preferences.php Multiple Variable XSS

2004-12-28T00:00:00
ID OSVDB:12608
Type osvdb
Reporter Sullo(sullo@cirt.net)
Modified 2004-12-28T00:00:00

Description

Vulnerability Description

Eventum contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'full_name', 'sms_email', 'list_refresh_rate' or 'emails_refresh_rate' variables upon submission to the preferences.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Eventum contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'full_name', 'sms_email', 'list_refresh_rate' or 'emails_refresh_rate' variables upon submission to the preferences.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://dev.mysql.com/downloads/other/eventum/index.html Security Tracker: 1012737 Secunia Advisory ID:13677 Related OSVDB ID: 12607 Related OSVDB ID: 12609 Related OSVDB ID: 12606 Other Advisory URL: http://bugs.mysql.com/bug.php?id=7552 Other Advisory URL: http://www.cirt.net/advisories/eventum_xss.shtml Nessus Plugin ID:16093 Bugtraq ID: 12133