PHP-Post profile.php user Variable XSS

2005-11-22T10:33:02
ID OSVDB:21058
Type osvdb
Reporter trueend5(trueend5@kapda.ir)
Modified 2005-11-22T10:33:02

Description

Vulnerability Description

PHP-Post contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "user" variable upon submission to the profile.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PHP-Post contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "user" variable upon submission to the profile.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/phpp/profile.php?user='%3CIFRAME%20SRC=javascript:alert(%2527XSS%2527)%3E%3C/IFRAME%3E

References:

Vendor URL: http://www.php-post.co.uk/ Secunia Advisory ID:17706 Related OSVDB ID: 21057 Related OSVDB ID: 21059 Other Advisory URL: http://irannetjob.com/content/view/168/28/ Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-11/0269.html Keyword: [KAPDA::#14] CVE-2005-3770 Bugtraq ID: 15524