[42486] in bugtraq

home help back first fref pref prev next nref lref last post

[eVuln] Pixelpost Photoblog XSS Vulnerability

daemon@ATHENA.MIT.EDU (alex@evuln.com)
Sun Jan 29 06:45:22 2006

Date: 23 Jan 2006 17:45:06 -0000
Message-ID: <20060123174506.29962.qmail@securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: alex@evuln.com
To: bugtraq@securityfocus.com

New eVuln Advisory:
Pixelpost Photoblog XSS Vulnerability
http://evuln.com/vulns/45/summary.html

--------------------Summary----------------

Software: Pixelpost Photoblog
Sowtware's Web Site: http://www.pixelpost.org/
Versions: 1.4.3
Critical Level: Moderate
Type: Cross-Site Scripting
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0045

-----------------Description---------------
Vulnerable script: index.php

Most of user-defined variables isn't properly sanitized. This can be used to post arbitrary html or script code. This code will be executed when administrator will open "comments" menu in admin CP.

Cookie-based authentication is threatened.

Administrator has an ability to upload arbitrary files.

System access is possible.

--------------Exploit----------------------
Available at: http://evuln.com/vulns/45/exploit.html


--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)

home help back first fref pref prev next nref lref last post