Top XL <=1.1 - XSS and cookie disclosure

2006-07-25 / 2006-07-26
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

[MajorSecurity #22] Top XL <=1.1 - XSS and cookie disclosure ----------------------------------------------------------------- Software: Top XL Version: <=1.1 Type: Cross site scripting and cookie disclosure Made public: July, 20th 2006 Vendor: http://www.paddelberg.de Page: http://www.paddelberg.de Rated as: Low Risk Credits: ---------------------------------------------- Discovered by: David "Aesthetico" Vieira-Kurz http://www.majorsecurity.de Original Advisory: ---------------------------------------------- http://www.majorsecurity.de/advisory/major_rls22.txt Affected Products: ---------------------------------------------- Top XL 1.1 and prior Description: ---------------------------------------------- Top XL is a toplist script working with static links. Requirements: ---------------------------------------------- register_globals = On Vulnerability: ---------------------------------------------- Input passed directly to the "pass" and "pass2" parameter in "add.php" and the "id" parameter in Members Area("/members/index.php") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. It works with a script code like this: >'><script>alert('MajorSecurity')</script><!-- Solution: ---------------------------------------------- Edit the source code to ensure that input is properly sanitised. You should work with "htmlspecialchars()" or "htmlentities()" php-function to ensure that html tags are not going to be executed. You should also work with the "intval()" php-function to ensure that the input is numeric. Example: <?php $pass = htmlentities($_POST['pass']); echo htmlspecialchars("<script"); $id = intval($_POST['id']); ?> Set "register_globals" to "Off".


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top