EPiX™ Search query XSS vuln.
Vuln. discovered by : r0t Date: 17 dec. 2005 orginal advisory:http://pridels.blogspot.com/2005/12/epix-search-query-xss-vuln.html vendor:http://www.go-epix.net/ affected version:3.1.2 and prior
EPIX is a low cost portal solution with CMS capabilities as well as support for JSR168 portlets. It is J2EE (Java) based and runs on any platform.
EPIX contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to search query paremter in search module isn't properly sanitised before being returned to the user. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Solution: Edit the source code to ensure that input is properly sanitised.