Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:14404
HistorySep 23, 2006 - 12:00 a.m.

[SA21992] BandSite CMS Cross-Site Scripting Vulnerabilities

2006-09-2300:00:00
vulners.com
24

TITLE:
BandSite CMS Cross-Site Scripting Vulnerabilities

SECUNIA ADVISORY ID:
SA21992

VERIFY ADVISORY:
http://secunia.com/advisories/21992/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting

WHERE:
>From remote

SOFTWARE:
BandSite CMS 1.x
http://secunia.com/product/10599/

DESCRIPTION:
HACKERS PAL has reported some vulnerabilities in BandSite CMS, which
can be exploited by malicious people to conduct cross-site scripting
attacks.

Input passed to the "max_file_size_purdy" parameter in
adminpanel/includes/helpfiles/help_mp3.php, the "message_text"
parameter in adminpanel/includes/mailinglist/sendemail.php, the
"this_year" parameter in includes/footer.php, and to the "the_band"
parameter in various files is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

It has also been reported, that it is possible to disclose the full
path to various scripts by requesting them directly.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
HACKERS PAL


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.