Jax Newsletter sign_in.php language Variable XSS

2005-08-05T10:17:53
ID OSVDB:18578
Type osvdb
Reporter Lostmon Lords(Lostmon@gmail.com)
Modified 2005-08-05T10:17:53

Description

Vulnerability Description

Jax Newsletter contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'language' variable upon submission to the sign_in.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Jax Newsletter contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'language' variable upon submission to the sign_in.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/newsletter/sign_in.php?do=sign_in&language=german[XSS-CODE]&ml_id=1&ml_id=1

References:

Vendor URL: http://www.jtr.de/scripting/php/index_eng.html Secunia Advisory ID:16332 Related OSVDB ID: 18577 Related OSVDB ID: 18579 Related OSVDB ID: 18580 Other Advisory URL: http://lostmon.blogspot.com/2005/08/jax-php-scripts-multiple.html Bugtraq ID: 14481