by r0t,der4444,cembo,VietMafia

Monday, December 05, 2005

Warm Links XSS vuln.

Warm Links XSS vuln.
Vuln. dicovered by : r0t
Date: 5 dec. 2005
vendor:http://www.mrcgiguy.com/wldetails.shtml
affected version:v.1.0.0 and prior

Product Description:
* Directory style index allows for easy navigation
* Does not require MySQL, MS Access, or any other database software. Warm Links uses it's own integrated flat-file database system.
* Customizable Color Scheme
* Duplicate link verification
* Easily edit the look of your directory without having to pick through any of the PERL code. Header and footer HTML is kept in seperate text files.
* Will run on any server with Perl 5.x and SendMail installed.


Vuln. description:

Input passed to the parameter in "search.cgi" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew