CuteNews example2.php id Variable XSS

2004-06-29T06:59:59
ID OSVDB:7286
Type osvdb
Reporter OSVDB
Modified 2004-06-29T06:59:59

Description

Vulnerability Description

CuteNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "id" variable upon submission to the "example2.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

CuteNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "id" variable upon submission to the "example2.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/example2.php?subaction=showfull&id=<script>alert(document.cookie);</script>

References:

Secunia Advisory ID:11964 Related OSVDB ID: 7284 Related OSVDB ID: 7285 Related OSVDB ID: 7283 Other Advisory URL: http://www.swp-zone.org/archivos/advisory-06.txt ISS X-Force ID: 16525 CVE-2004-0660 Bugtraq ID: 10620