by r0t,der4444,cembo,VietMafia

Friday, December 30, 2005

AdesGuestbook XSS vuln.

AdesGuestbook XSS vuln.

Vuln. discovered by : r0t
Date: 30 dec. 2005
vendor:www.adesdesign.net/php/products_adesguestbook.php
affected version:v2.0 and prior


Product Description:

This is a Guestbook which works with PHP and MySql. Admin Page is a secure page that can be logged in only by admininstrator and includes functions such as deleting the record and modifying the record. Records can be deleted/modified by ID, Email and Date. It is developed with the customization in mind, so you can easily change the look of the AdesGuestbook according to your website. It uses one single CSS file for the table colors and text format. By changing this CSS file you can apply your choice of colors easily to the whole Guestbook.

Vuln. Description:

AdesGuestbook contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "totalRows_rsRead" paremter in "read.php" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

poc:


/read.php?pageNum_rsRead=1&totalRows_rsRead=[XSS]


Solution:
Edit the source code to ensure that input is properly sanitised.

1 Comments:

Anonymous Anonymous told...

CVSVVSSCSC

6:47 AM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew