Simplog archive.php keyw Variable XSS

2006-08-06T05:35:04
ID OSVDB:27823
Type osvdb
Reporter HeLiOsZ(heliosz_time@hotmail.com)
Modified 2006-08-06T05:35:04

Description

Vulnerability Description

Simplog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'keyw' variables upon submission to the 'archive.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Simplog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'keyw' variables upon submission to the 'archive.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.simplog.org/ Security Tracker: 1016651 Secunia Advisory ID:21390 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-08/0126.html ISS X-Force ID: 28266 FrSIRT Advisory: ADV-2006-3186 CVE-2006-4058 Bugtraq ID: 19411