Easy Forum join.php image Variable XSS

2006-02-21T07:32:34
ID OSVDB:23430
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-02-21T07:32:34

Description

Vulnerability Description

Easy Forum contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Image URL field ('image' variable) upon submission to the 'join.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Easy Forum contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Image URL field ('image' variable) upon submission to the 'join.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://hot-things.net/?q=eforum Secunia Advisory ID:18996 Other Advisory URL: http://evuln.com/vulns/85/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0634.html Keyword: EV0085 CVE-2006-0877