lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 27 Mar 2006 09:37:45 +0200 From: Matteo Beccati <matteo@...cati.com> To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk Subject: [PHPADSNEW-SA-2006-001] phpAdsNew and phpPgAds 2.0.8 fix multiple vulnerabilities ======================================================================== phpAdsNew / phpPgAds security advisory PHPADSNEW-SA-2006-001 ------------------------------------------------------------------------ Advisory ID: PHPADSNEW-SA-2006-001 Date: 2006-Mar-27 Security risk: medium risk Applications affetced: phpAdsNew, phpPgAds Versions affected: <= 2.0.7 Versions not affected: >= 2.0.8 ======================================================================== ======================================================================== Vulnerability 1: HTML injection / Cross-site scripting ======================================================================== Description ----------- Some scripts inside the admin interface were displaying parameters collected by the delivery scripts without proper sanitizing or escaping. The delivery scripts have public access, while the admin interface is restricted to logged in users. An attacker could inject HTML/XSS code which could be displayed/executed in a later time inside the admin interface. Solution -------- - Upgrade to phpAdsNew or phpPgAds 2.0.8. ======================================================================== Vulnerability 2: HTML injection / Cross-site scripting ======================================================================== Description ----------- The login form was sending back to the browser the unmodified query string, making possible for an attacker to inject HTML/XSS code by using a specifically crafted URL. Solution -------- - Upgrade to phpAdsNew or phpPgAds 2.0.8. Contact informations ==================== The security contact for phpAdsNew and phpPgAds can be reached at: <security AT phpadsnew DOT com> Best regards -- Matteo Beccati http://phpadsnew.com http://phppgads.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists