[V]Book index.php Multiple Variable XSS

2006-03-29T04:02:39
ID OSVDB:24271
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-03-29T04:02:39

Description

Vulnerability Description

[V]book contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'autor', 'www', 'temat', or 'tresc' variables upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

[V]book contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'autor', 'www', 'temat', or 'tresc' variables upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.vscripts.pl/?id=vbook2 Secunia Advisory ID:19448 Related OSVDB ID: 24270 Related OSVDB ID: 24272 Other Advisory URL: http://evuln.com/vulns/111/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0208.html Keyword: EV0111 ISS X-Force ID: 25521 FrSIRT Advisory: ADV-2006-1174 CVE-2006-1562 Bugtraq ID: 17319