EVA-Web <=2.1.2 vuln.
###############################################
Vuln. discovered by : r0t
Date: 27 may 2006
vendor:http://spip-edu.edres74.net/
affected versions:2.1.2 and prior
orginal advisory:http://pridels.blogspot.com/2006/05/eva-web-212-vuln.html
###############################################
Vuln. Description:
EVA-Web contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to "debut_image"
parameter in "article-album.php3" and "date" parameter in
"rubrique.php3" and "perso","aide" parameters isn't properly sanitised
before being returned to the user.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust
relationship between the browser and the server, leading to a loss of
integrity.
examples:
/article-album.php3?id_article=39&debut_image=[XSS]
/rubrique.php3?id_rubrique=29&date=[XSS]
/?perso=[XSS]
/?aide=[XSS]
/?perso=file
/?aide=file
###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/