Secunia - Stay Secure
 
Home Corporate Website Jobs Mailing Lists RSS Blog Advertise

Solutions For
  Security Professionals
  Security Vendors

Free Solutions For
  Open Communities
  Journalists & Media

Online Services New!
  Secunia Blog New Entry
  Software Inspector
  Network Software Inspector (BETA)

Secunia Advisories
  Search
  Historic Advisories
  Listed By Product
  Listed By Vendor
  Statistics / Graphs
  Secunia Research
  Report Vulnerability
  About Advisories

Virus Information
  Chronological List
  Last 10 Virus Alerts
  About Virus Information

Secunia Customers
  Customer Area


Software Inspector

Private Message System Cross-Site Scripting Vulnerability Advisory Available in Danish 

Secunia Advisory: SA10501  
Release Date: 2003-12-29

Critical:
Less critical
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch

Software:Private Message System (PMSys) 2.x



Description:
David Sopas Ferreira has discovered a vulnerability in Private Message System, which can be exploited by malicious people to conduct cross-site scripting attacks.

The vulnerability is caused due to missing validation of input supplied to the "page" parameter in "index.php". This can be exploited to execute arbitrary HTML or script code in a user's browser session in the context of an affected site.

Successful exploitation can result in disclosure of various information (e.g. cookie-based authentication information) associated with the site running Private Message System or inclusion of malicious content, which the user thinks is part of the real website.

Example:
http://[vulnerable_system]/index.php?page="><script>alert(document.domain);</script>

The vulnerability has been reported in version 2.2.9 and prior.

Solution:
Update to version 2.3.0.
http://sourceforge.net/project/showfiles.php?group_id=70228

Provided and/or discovered by:
David Sopas Ferreira

Original Advisory:
Product changelog:
http://sourceforge.net/project/shownotes.php?release_id=206300



Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.








BETA test the Network Software Inspector

Secunia Poll

Do you have products, that have reached End-of-Life support, installed across your network?


See Results   

Most Popular Advisories

1.
Cisco Products HTTP Unicode Encoding Detection Bypass
2.
BEA Products Multiple Vulnerabilities
3.
Red Hat update for tomcat
4.
NagiosQL "functions/prep end_adm.php" File Inclusion
5.
Caucho Resin Multiple Information Disclosure Vulnerabilities
6.
BEA JRockit Multiple Vulnerabilities
7.
HP Systems Insight Manager Session Fixation Vulnerability
8.
Samba Multiple Vulnerabilities
9.
YAAP "root_path" File Inclusion Vulnerability
10.
SonicBB SQL Injection and Cross-Site Scripting





Vulnerability Management - Terms & Conditions - Copyright 2002-2007 Secunia - Compliance - Contact Secunia