Simple PHP Blog preview_static_cgi.php Multiple Variable XSS

2005-11-02T14:45:05
ID OSVDB:20437
Type osvdb
Reporter Nenad Jovanovic(enji@infosys.tuwien.ac.at)
Modified 2005-11-02T14:45:05

Description

Vulnerability Description

Simple PHP Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'entry', 'temp_subject', 'temp_text', and 'temp_file_name' variables upon submission to the 'preview_static_cgi.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Simple PHP Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'entry', 'temp_subject', 'temp_text', and 'temp_file_name' variables upon submission to the 'preview_static_cgi.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.simplephpblog.com/ Secunia Advisory ID:17404 Related OSVDB ID: 20438 Related OSVDB ID: 20436 Other Advisory URL: http://www.seclab.tuwien.ac.at/advisories/TUVSA-0511-001.txt Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-11/0006.html CVE-2005-3473 Bugtraq ID: 15283