Lucene search

K

olatedownload-xss.txt

🗓️ 24 Aug 2007 00:00:00Reported by imei addmimistratorType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 20 Views

Olate Download prone to unpatched remote cross site scripting exploit. Exploit available, no solution. Vulnerability in line 231, using weak pattern (.*) in preg_replace

Show more
Code
`-Summary-  
Software: Olate Download  
Sowtwares Web Site: http://www.olate.co.uk/  
Versions: 3.4.2  
Class: Remote  
Status: Unpatched  
Exploit: Available  
Solution: Not Available  
Discovered by: imei addmimistrator  
Risk Level: Middel  
Description  
Olate download is prone to Cross site scripting, cause of simple code replacing for comments in mentioned file  
bug is in line about 231, that programmers simply replaced some patterns with some equivalents.  
Usually, phrasing codes are a complicated process especially if there was more codes and more cases. codes embedded into HTML tags, are more dangerous. Im approximately sure that there is no reasonable solution but using Regular Expression for this propose. In this case, 3 other codes phrased using str_replace() function that is very weaker than preg_replace().  
Look at the related code:  
$comment[comment] = preg_replace(/\[url\](.*)\[\/url\]/si,$1,$comment[comment]);  
Even in this using of preg_replace, using a weak pattern (.*) results to a simple XSS bug.  
Exploit-  
comment this at a desired file detail:  
[url]javascript:alert(1)[/url]  
Solution  
Not any updates available~  
Credit  
Discovered by: imei addmimistrator  
addmimistrator(4}gmail(O}com  
www.myimei.com  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Aug 2007 00:00Current
7.4High risk
Vulners AI Score7.4
20
.json
Report