VBZooM comment.php UserID Variable XSS

2006-03-06T04:04:33
ID OSVDB:23812
Type osvdb
Reporter Mr.SNAKE(mr_snake_my@hotmail.com)
Modified 2006-03-06T04:04:33

Description

Vulnerability Description

VBZooM contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'UserID' variables upon submission to the comment.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

VBZooM contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'UserID' variables upon submission to the comment.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/vz/comment.php?UserID='>XSS

References:

Vendor URL: http://www.vbzoom.com/ Related OSVDB ID: 23813 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-02/0671.html CVE-2006-1133 Bugtraq ID: 16956 Bugtraq ID: 16969