OpenFAQ submit.php q Variable XSS

2006-05-05T12:17:33
ID OSVDB:25350
Type osvdb
Reporter Kamil 'K3' Sienicki(K3@spelunca.int.pl)
Modified 2006-05-05T12:17:33

Description

Vulnerability Description

OpenFAQ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'q' variable upon submission to the submit.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

OpenFAQ contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'q' variable upon submission to the submit.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://sourceforge.net/projects/openfaq Secunia Advisory ID:20018 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-05/0102.html ISS X-Force ID: 26286 FrSIRT Advisory: ADV-2006-1684 CVE-2006-2252 Bugtraq ID: 17860