PluggedOut Blog problem.php data Variable XSS

2006-02-04T04:33:27
ID OSVDB:22927
Type osvdb
Reporter Hamid Ebadi(admin@hamid.ir)
Modified 2006-02-04T04:33:27

Description

Vulnerability Description

PluggedOut Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'data' variable upon submission to the problem.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

PluggedOut Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'data' variable upon submission to the problem.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/problem.php?id=1&data=<script>alert('vuln');alert(document.cookie)</script>

References:

Vendor URL: http://www.pluggedout.com/ Security Tracker: 1015586 Secunia Advisory ID:18726 Related OSVDB ID: 22926 Other Advisory URL: http://hamid.ir/security/pluggedoutblog.txt Mail List Post: http://attrition.org/pipermail/vim/2006-February/000530.html ISS X-Force ID: 24482 FrSIRT Advisory: ADV-2006-0440 CVE-2006-0562