Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12833
HistoryMay 27, 2006 - 12:00 a.m.

EVA-Web <=2.1.2 vuln.

2006-05-2700:00:00
vulners.com
12

EVA-Web <=2.1.2 vuln.

###############################################
Vuln. discovered by : r0t
Date: 27 may 2006
vendor:http://spip-edu.edres74.net/
affected versions:2.1.2 and prior
orginal advisory:http://pridels.blogspot.com/2006/05/eva-web-212-vuln.html
###############################################

Vuln. Description:

EVA-Web contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to "debut_image"
parameter in "article-album.php3" and "date" parameter in
"rubrique.php3" and "perso","aide" parameters isn't properly sanitised
before being returned to the user.
This could allow a user to create a specially crafted URL that would
execute arbitrary code in a user's browser within the trust
relationship between the browser and the server, leading to a loss of
integrity.

examples:

/article-album.php3?id_article=39&debut_image=[XSS]
/rubrique.php3?id_rubrique=29&date=[XSS]
/?perso=[XSS]
/?aide=[XSS]

  • Bonnus [Possible local file include]

/?perso=file
/?aide=file

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/