iFlance admincp/login.php adminU Variable XSS

2006-05-24T04:49:23
ID OSVDB:26045
Type osvdb
Reporter luny(luny@youfucktard.com)
Modified 2006-05-24T04:49:23

Description

Vulnerability Description

iFlance contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'adminU' variable upon submission to the admincp/login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

iFlance contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'adminU' variable upon submission to the admincp/login.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.ifusionservices.co.uk/ Secunia Advisory ID:20282 Related OSVDB ID: 26043 Related OSVDB ID: 26047 Related OSVDB ID: 26046 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-05/0535.html ISS X-Force ID: 26696 FrSIRT Advisory: ADV-2006-1988 Bugtraq ID: 18102