|
|
Private Message System Cross-Site Scripting Vulnerability
|
|
|
|
Secunia Advisory:
|
SA10501
|
|
Release Date:
|
2003-12-29
|
|
Critical:
|
Less critical
|
Impact:
|
Cross Site Scripting
|
Where:
|
From remote
|
Solution Status:
|
Vendor Patch
|
|
Software: | Private Message System (PMSys) 2.x
|
|
|
|
|
Description: David Sopas Ferreira has discovered a vulnerability in Private Message System, which can be exploited by malicious people to conduct cross-site scripting attacks.
The vulnerability is caused due to missing validation of input supplied to the "page" parameter in "index.php". This can be exploited to execute arbitrary HTML or script code in a user's browser session in the context of an affected site.
Successful exploitation can result in disclosure of various information (e.g. cookie-based authentication information) associated with the site running Private Message System or inclusion of malicious content, which the user thinks is part of the real website.
Example:
http://[vulnerable_system]/index.php?page="><script>alert(document.domain);</script>
The vulnerability has been reported in version 2.2.9 and prior.
Solution: Update to version 2.3.0.
http://sourceforge.net/project/showfiles.php?group_id=70228
Provided and/or discovered by: David Sopas Ferreira
Original Advisory: Product changelog:
http://sourceforge.net/project/shownotes.php?release_id=206300
|
|
|
|
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
|
|
|
Send Feedback to Secunia
|
|
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.
Ideas, suggestions, and other feedback are most welcome.
|
|
|
|
|
|
|
|
Secunia Poll
|
|
|
|
Most Popular Advisories
|
|
|
|
|