Dynamic Galerie index.php pfad Variable XSS

2006-05-05T05:47:39
ID OSVDB:25443
Type osvdb
Reporter d4igoro(d4igoro@gmail.com)
Modified 2006-05-05T05:47:39

Description

Vulnerability Description

Dynamic Galerie contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'pfad' variable upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Dynamic Galerie contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'pfad' variable upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/index.php?pfad=[XSS]

References:

Vendor URL: http://www.timobraun.de/ Secunia Advisory ID:19995 Related OSVDB ID: 25442 Related OSVDB ID: 25444 Related OSVDB ID: 25441 Other Advisory URL: http://d4igoro.blogspot.com/2006/05/dynamic-galerie-10-path-traversal-xss.html FrSIRT Advisory: ADV-2006-1699 CVE-2006-2294 Bugtraq ID: 17896