PHP-Nuke NukeJokes Module Multiple Variable XSS

2004-05-08T05:09:31
ID OSVDB:6012
Type osvdb
Reporter Janek Vind "waraxe"(come2waraxe@yahoo.com)
Modified 2004-05-08T05:09:31

Description

Vulnerability Description

NukeJokes contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "cat" or "jokeid" variable upon submission to the NukeJokes module. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 2.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

NukeJokes contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "cat" or "jokeid" variable upon submission to the NukeJokes module. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/nuke72/modules.php?name=NukeJokes&func=CatView&cat=[XSS CODE] http://[victim]/nuke72/modules.php?name=NukeJokes&func=JokeView&jokeid=[XSS CODE]

References:

Vendor URL: http://funportal.beanwebb.com/ Security Tracker: 1010102 Secunia Advisory ID:11579 Related OSVDB ID: 6011 Related OSVDB ID: 6013 Other Advisory URL: http://www.waraxe.us/index.php?modname=sa&id=28 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-05/0067.html ISS X-Force ID: 16096 CVE-2004-2007 Bugtraq ID: 10306