EZGallery common/pupload.asp Multiple Variable XSS

2006-06-09T17:19:05
ID OSVDB:26371
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-06-09T17:19:05

Description

Vulnerability Description

EZGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'aid', 'aname', 'uid', 'm', 'gp', and 'g' variables upon submission to the common/pupload.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

EZGallery contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'aid', 'aname', 'uid', 'm', 'gp', and 'g' variables upon submission to the common/pupload.asp script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.htmljunction.net/ezgallery/ Secunia Advisory ID:20553 Related OSVDB ID: 26372 Related OSVDB ID: 26373 Related OSVDB ID: 26370 Other Advisory URL: http://pridels.blogspot.com/2006/06/ezgallery-v15-xss-vuln.html