XRMS CRM "msg" Cross Site Scripting VulnerabilityMonday, 3 March 2008Description:
vijayv has reported a vulnerability in XRMS CRM, which can be exploited by malicious people to conduct cross-site scripting attacks.
Input passed to the "msg" parameter in /admin/users/self.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Successful exploitation requires that the target user is logged-in to the application.
Solution:
Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by:
vijayv
Original Advisory:
http://secunia.com/advisories/29177/
http://seclists.org/bugtraq/2008/Feb/0437.html
Share this content:
|