gtd-php newProject.php Multiple Field XSS

2006-03-27T00:00:00
ID OSVDB:24149
Type osvdb
Reporter security curmudgeon(jericho@attrition.org)
Modified 2006-03-27T00:00:00

Description

Vulnerability Description

gtd-php contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Project Name or Description field ('name' and 'description' variables) upon submission to the newProject.php script. The script code is rendered when the listProjects.php is called. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

gtd-php contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Project Name or Description field ('name' and 'description' variables) upon submission to the newProject.php script. The script code is rendered when the listProjects.php is called. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://gtd-php.sourceforge.net/ Secunia Advisory ID:19512 Related OSVDB ID: 24153 Related OSVDB ID: 24155 Related OSVDB ID: 24156 Related OSVDB ID: 24151 Related OSVDB ID: 24152 Related OSVDB ID: 24157 Related OSVDB ID: 24154 Related OSVDB ID: 24150 Related OSVDB ID: 24158 Other Advisory URL: http://osvdb.org/ref/24/24149-gtd-php.txt FrSIRT Advisory: ADV-2006-1203 CVE-2006-1479 Bugtraq ID: 17366