Fusion fullnews.php id Variable XSS

2004-04-23T09:26:40
ID OSVDB:5622
Type osvdb
Reporter DarkBicho(darkbicho@gmail.com)
Modified 2004-04-23T09:26:40

Description

Vulnerability Description

Fusion News contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' parameter upon submission to the fullnews.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Fusion News contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'id' parameter upon submission to the fullnews.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[target]/fullnews.php?id=<script>alert(document.cookie);</script>

References:

Security Tracker: 1009920 Secunia Advisory ID:11474 Other Advisory URL: http://bichosoft.webcindario.com/advisory-02.txt Other Advisory URL: http://www.security-corporation.com/articles-20040424-001.html ISS X-Force ID: 15949 Bugtraq ID: 10203