EPiX™ Search query XSS vuln.

2005-12-17T00:00:00
ID SECURITYVULNS:DOC:10675
Type securityvulns
Reporter Securityvulns
Modified 2005-12-17T00:00:00

Description

EPiX™ Search query XSS vuln.

Vuln. discovered by : r0t Date: 17 dec. 2005 orginal advisory:http://pridels.blogspot.com/2005/12/epix-search-query-xss-vuln.html vendor:http://www.go-epix.net/ affected version:3.1.2 and prior

Product Description:

EPIX is a low cost portal solution with CMS capabilities as well as support for JSR168 portlets. It is J2EE (Java) based and runs on any platform.

Vuln. Description:

EPIX contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to search query paremter in search module isn't properly sanitised before being returned to the user. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution: Edit the source code to ensure that input is properly sanitised.