lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060123174506.29962.qmail@securityfocus.com> Date: 23 Jan 2006 17:45:06 -0000 From: alex@...ln.com To: bugtraq@...urityfocus.com Subject: [eVuln] Pixelpost Photoblog XSS Vulnerability New eVuln Advisory: Pixelpost Photoblog XSS Vulnerability http://evuln.com/vulns/45/summary.html --------------------Summary---------------- Software: Pixelpost Photoblog Sowtware's Web Site: http://www.pixelpost.org/ Versions: 1.4.3 Critical Level: Moderate Type: Cross-Site Scripting Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0045 -----------------Description--------------- Vulnerable script: index.php Most of user-defined variables isn't properly sanitized. This can be used to post arbitrary html or script code. This code will be executed when administrator will open "comments" menu in admin CP. Cookie-based authentication is threatened. Administrator has an ability to upload arbitrary files. System access is possible. --------------Exploit---------------------- Available at: http://evuln.com/vulns/45/exploit.html --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)