gtd-php projectReport.php projectName Variable XSS

2006-03-27T00:00:00
ID OSVDB:24157
Type osvdb
Reporter security curmudgeon(jericho@attrition.org)
Modified 2006-03-27T00:00:00

Description

Vulnerability Description

gtd-php contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'projectName' variable upon submission to the projectReport.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

gtd-php contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'projectName' variable upon submission to the projectReport.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/gtd/projectReport.php?projectId=7&projectName=%3Cscript%3Ealert(document.cookie)%3C/script%3E%20347

References:

Vendor URL: http://gtd-php.sourceforge.net/ Secunia Advisory ID:19512 Related OSVDB ID: 24153 Related OSVDB ID: 24155 Related OSVDB ID: 24156 Related OSVDB ID: 24151 Related OSVDB ID: 24152 Related OSVDB ID: 24149 Related OSVDB ID: 24154 Related OSVDB ID: 24150 Related OSVDB ID: 24158 Other Advisory URL: http://osvdb.org/ref/24/24149-gtd-php.txt FrSIRT Advisory: ADV-2006-1203 CVE-2006-1479 Bugtraq ID: 17366