Vuln. discovered by : r0t Date: 21 June 2007 vendor:http://www.netjukebox.nl/ orginal advisory: http://pridels-team.blogspot.com/2007/06/netjukebox-vuln.html affected versions: tested on "netjukebox 4.01b" other versions also can be affected.
netjukebox contains a flaws that allows a remote Cross-Site Scripting attacks.Input passed to the "album_id","order","sort","filter","genre_id" parameter in "index.php" isn't properly sanitised before being returned to the user. And Input passed to the "url" parameter in "ridirect.php" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Also attacker by testing XSS vuln. parameters will get full install path.
Solution: Edit the source code to ensure that input is properly sanitised.