Photostand_1.2.0 Multiple Cross Site Scripting

2007.02.28
Credit: Simon Bonnard
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

Photostand_1.2.0 Multiple Cross Site Scripting Vendor site : http://www.photostand.org/ Global risk : medium XSS ----- + Permanents Message & name fields are vulnerable to xss attacks. This kind of xss are pretty dangerous,because anyone who see the page gone get his cookie stolen and sended to the attackers + Non Permanant index.php?page=search&q=<script>alert(document.cookie)</script> Full Path Disclorure - ----------------------- "PHPSESSID='" will returns the full path of the file. GET /photostand_1.2.0/ HTTP/1.0 [...] Cookie: PS_STATS_VT=true;PS_STATS_VR=true;PHPSESSID=';style=[blahblah]path=/ [...] /photostand_1.2.0/index.php?page=article&id=' too. Solutions : www.php.net/htmlentities regards, Simon Bonnard contact : simon.itsecurity - at - gmail - dot- com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top