pixelpostXSS.txt

2006-01-29T00:00:00
ID PACKETSTORM:43460
Type packetstorm
Reporter Aliaksandr Hartsuyeu
Modified 2006-01-29T00:00:00

Description

                                        
                                            `New eVuln Advisory:  
Pixelpost Photoblog XSS Vulnerability  
http://evuln.com/vulns/45/summary.html  
  
--------------------Summary----------------  
  
Software: Pixelpost Photoblog  
Sowtware's Web Site: http://www.pixelpost.org/  
Versions: 1.4.3  
Critical Level: Moderate  
Type: Cross-Site Scripting  
Class: Remote  
Status: Unpatched  
Exploit: Available  
Solution: Not Available  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
eVuln ID: EV0045  
  
-----------------Description---------------  
Vulnerable script: index.php  
  
Most of user-defined variables isn't properly sanitized. This can be used to post arbitrary html or script code. This code will be executed when administrator will open "comments" menu in admin CP.  
  
Cookie-based authentication is threatened.  
  
Administrator has an ability to upload arbitrary files.  
  
System access is possible.  
  
--------------Exploit----------------------  
Available at: http://evuln.com/vulns/45/exploit.html  
  
Link: http://host/pixelpost/index.php? popup=comment&showimage=1  
  
Add Comment: <XSS>  
  
  
--------------Solution---------------------  
No Patch available.  
  
--------------Credit-----------------------  
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)  
`