EasyMoblog img.php i Variable XSS

2006-03-23T03:17:39
ID OSVDB:24094
Type osvdb
Reporter FarhadKey(FarhadKey@kapda.ir)
Modified 2006-03-23T03:17:39

Description

Vulnerability Description

EasyMoblog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'i' variable upon submission to the img.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

EasyMoblog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'i' variable upon submission to the img.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/path/img.php?i=[XSS]

References:

Vendor URL: http://www.easymoblog.org/ Secunia Advisory ID:19370 Related OSVDB ID: 24093 Other Advisory URL: http://www.kapda.ir/advisory-301.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0053.html FrSIRT Advisory: ADV-2006-1087 CVE-2006-1377 Bugtraq ID: 17199