InverseFlow Help Desk System ticket.php email Variable XSS

2006-11-22T05:48:54
ID OSVDB:30666
Type osvdb
Reporter OSVDB
Modified 2006-11-22T05:48:54

Description

Vulnerability Description

InverseFlow Help Desk System contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'email' variable upon submission to the ticket.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

InverseFlow Help Desk System contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'email' variable upon submission to the ticket.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/support_path/ticket.php?email=[xss]

References:

Secunia Advisory ID:23052 Related OSVDB ID: 30665 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-11/0459.html ISS X-Force ID: 30489 FrSIRT Advisory: ADV-2006-4672 CVE-2006-6158 Bugtraq ID: 21250