sBLOG comments_do.php Multiple Variable POST Method XSS

2006-03-07T12:47:36
ID OSVDB:23760
Type osvdb
Reporter Kiki(federico.sana@alice.it)
Modified 2006-03-07T12:47:36

Description

Vulnerability Description

sBLOG contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'title' and 'username' variables upon submission to the comments_do.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

sBLOG contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'title' and 'username' variables upon submission to the comments_do.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://servous.se/ Secunia Advisory ID:19151 Related OSVDB ID: 23759 Other Advisory URL: http://kiki91.altervista.org/exploit/sBlog_0.72_xss.txt FrSIRT Advisory: ADV-2006-0883 CVE-2006-1135 Bugtraq ID: 17044