Pluck 4.5.2 Multiple Cross Site Scripting Vulnerabilities

2008-08-05 / 2008-08-06
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

---------------------------------------------------------------- Script : Pluck 4.5.2 Type : Multiple Cross Site Scripting Vulnerabilities Alert : Medium ---------------------------------------------------------------- Download From : http://www.pluck-cms.org/downloads/pluck-4_5_2.tar.gz ---------------------------------------------------------------- Discovered by : Khashayar Fereidani Or Dr.Crash My Website : http://FEREIDANI.IR Our Team Website : http://IRCRASH.COM Khashayar Fereidani Email : irancrash [ a t ] gmail [ d o t ] com ---------------------------------------------------------------- Cross Site Scripting Vulnerabilities : All vulnerabilities work when register_globals set as on , XSS Vulnerability 1 : /data/inc/footer.php => http://Example.com/data/inc/footer.php?lang_footer=[Cross Site Scripting] XSS Vulnerability 2 : /data/inc/header.php => http://Example.com/data/inc/header.php?pluck_version=[Cross Site Scripting] XSS Vulnerability 3 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_install22=[Cross Site Scripting] XSS Vulnerability 4 : /data/inc/header.php => http://Example.com/data/inc/header.php?titelkop=[Cross Site Scripting] XSS Vulnerability 5 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_kop1=[Cross Site Scripting] XSS Vulnerability 6 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_kop2=[Cross Site Scripting] XSS Vulnerability 7 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_modules=[Cross Site Scripting] XSS Vulnerability 8 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_kop4=[Cross Site Scripting] XSS Vulnerability 9 : /data/inc/header.php => http://Example.com/pluck/data/inc/header.php?lang_kop15=[Cross Site Scripting] XSS Vulnerability 10 : /data/inc/header.php => http://Example.com/data/inc/header.php?lang_kop5=[Cross Site Scripting] XSS Vulnerability 11 : /data/inc/header.php => http://Example.com/data/inc/header.php?titelkop=[Cross Site Scripting] XSS Vulnerability 12 : /data/inc/header2.php => http://Example.com/data/inc/header2.php?pluck_version=[Cross Site Scripting] XSS Vulnerability 13 : /data/inc/header2.php => http://Example.com/data/inc/header2.php?titelkop=[Cross Site Scripting] XSS Vulnerability 14 : /data/inc/header2.php => http://Example.com/data/inc/header2.php?titelkop=[Cross Site Scripting] XSS Vulnerability 15 : /data/inc/themeinstall.php => http://Example.com/data/inc/themeinstall.php?lang_theme6=[Cross Site Scripting] Solution : Filter all insecure variable with htmlspecialchars() function .... ---------------------------------------------------------------- Tnx : God http://IRCRASH.COM & http://FEREIDANI.IR ----------------------------------------------------------------

References:

http://www.securityfocus.com/archive/1/archive/1/495110/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top