Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17310
HistoryJun 21, 2007 - 12:00 a.m.

netjukebox vuln.

2007-06-2100:00:00
vulners.com
25

netjukebox vuln.

###############################################
Vuln. discovered by : r0t
Date: 21 June 2007
vendor:http://www.netjukebox.nl/
orginal advisory:
http://pridels-team.blogspot.com/2007/06/netjukebox-vuln.html
affected versions: tested on "netjukebox 4.01b"
other versions also can be affected.
###############################################

netjukebox contains a flaws that allows a remote Cross-Site Scripting
attacks.Input passed to the "album_id","order","sort","filter","genre_id"
parameter in "index.php" isn't properly sanitised before being returned to
the user.
And Input passed to the "url" parameter in "ridirect.php" isn't properly
sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

Also attacker by testing XSS vuln. parameters will get full install path.

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################