Toms Gästebuch form.php Multiple Variable XSS

2007-09-01T12:27:00
ID OSVDB:36735
Type osvdb
Reporter cod3in(cod3in@gmail.com)
Modified 2007-09-01T12:27:00

Description

Vulnerability Description

Toms Gästebuch contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'homepage', 'mail' and 'name' variables upon submission to the 'form.php' script when the 'action' variable is set to 'show'. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.02 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Toms Gästebuch contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'homepage', 'mail' and 'name' variables upon submission to the 'form.php' script when the 'action' variable is set to 'show'. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[TARGET]/form.php?action=show&homepage=[XSS]&mail=[XSS]&name=[XSS]

References:

Vendor URL: http://www.toms-seiten.at Secunia Advisory ID:26662 Related OSVDB ID: 36736 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-09/0082.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2007-09/0006.html ISS X-Force ID: 36404 CVE-2007-4711 Bugtraq ID: 25507