myEvent addevent.php event_desc Variable XSS

2006-04-18T05:17:38
ID OSVDB:24719
Type osvdb
Reporter Botan(botanlinuxmail.org)
Modified 2006-04-18T05:17:38

Description

Vulnerability Description

myEvent contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'event_desc' variable upon submission to the addevent.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off' and the register_globals PHP option is 'on'.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

myEvent contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'event_desc' variable upon submission to the addevent.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://mywebland.com/ Secunia Advisory ID:19680 Related OSVDB ID: 24724 Related OSVDB ID: 24720 Related OSVDB ID: 24722 Nessus Plugin ID:21246 Mail List Post: http://seclists.org/lists/bugtraq/2006/Apr/0331.html FrSIRT Advisory: ADV-2006-1384 CVE-2006-1908 Bugtraq ID: 17580