PHP iAddressBook q Form Field XSS

2006-08-21T11:03:57
ID OSVDB:28172
Type osvdb
Reporter OSVDB
Modified 2006-08-21T11:03:57

Description

Vulnerability Description

PHP iAddressBook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'q' form field upon submission to an unspecified script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 0.94 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

PHP iAddressBook contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'q' form field upon submission to an unspecified script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://wacha.ch/wiki/addressbook Vendor Specific News/Changelog Entry: http://wacha.ch/wiki/addressbook:changelog Secunia Advisory ID:21610 Related OSVDB ID: 28173