TorrentTrader Classic "msg" Script Insertion VulnerabilitySunday, 16 March 2008Description:
Dominus has discovered a vulnerability in TorrentTrader Classic, which can be exploited by malicious users to conduct script insertion attacks.
Input passed to the "msg" parameter in account-inbox.php is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when e.g. viewing messages in account.php.
The vulnerability is confirmed in version 1.08. Other versions may also be affected.
Solution:
Edit the source code to ensure that input is properly sanitised.
Provided and/or discovered by:
Dominus
Changelog:
2008-03-11: Added CVE reference.
http://secunia.com/advisories/29220/
Share this content:
|