DGBook index.php Multiple Variable XSS

2006-05-22T05:34:17
ID OSVDB:25732
Type osvdb
Reporter luny(luny@youfucktard.com)
Modified 2006-05-22T05:34:17

Description

Vulnerability Description

DGBook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "name", "homepage", "email", and "address" variables upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

DGBook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "name", "homepage", "email", and "address" variables upon submission to the index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.diangemilang.com/dgscripts.php Secunia Advisory ID:20201 Related OSVDB ID: 25733 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-05/0477.html FrSIRT Advisory: ADV-2006-1942 CVE-2006-2572 Bugtraq ID: 18310