SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   phpPgAds Vendors:   phpadsnew.com
phpPgAds Input Validation Holes in Admin Scripts and Login Form Permit Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1015828
SecurityTracker URL:  http://securitytracker.com/id/1015828
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 27 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.0.7 and prior versions
Description:   A vulnerability was reported in phpPgAds. A remote user can conduct cross-site scripting attacks

Several scripts within the admin interface do not properly filter HTML code from user-supplied input (collected by the delivery scripts) before displaying the input. A remote user can submit specially crafted data. Then, when the affected admin scripts are loaded by a target administrator, arbitrary scripting code will be executed by the target administrator's browser. The code will originate from the site running the phpPgAds software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The login form does not properly filter HTML code from user-supplied input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the phpPgAds software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   The vendor has issued a fixed version (2.0.8).
Vendor URL:  phppgads.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  [Full-disclosure] [PHPADSNEW-SA-2006-001] phpAdsNew and phpPgAds

========================================================================
phpAdsNew / phpPgAds security advisory             PHPADSNEW-SA-2006-001
------------------------------------------------------------------------
Advisory ID:           PHPADSNEW-SA-2006-001
Date:                  2006-Mar-27
Security risk:         medium risk
Applications affetced: phpAdsNew, phpPgAds
Versions affected:     <= 2.0.7
Versions not affected: >= 2.0.8
========================================================================


========================================================================
Vulnerability 1:  HTML injection / Cross-site scripting
========================================================================

Description
-----------
Some scripts inside the admin interface were displaying parameters 
collected by the delivery scripts without proper sanitizing or escaping. 
The delivery scripts have public access, while the admin interface is 
restricted to logged in users. An attacker could inject HTML/XSS code 
which could be displayed/executed in a later time inside the admin 
interface.

Solution
--------
- Upgrade to phpAdsNew or phpPgAds 2.0.8.


========================================================================
Vulnerability 2:  HTML injection / Cross-site scripting
========================================================================

Description
-----------
The login form was sending back to the browser the unmodified query 
string, making possible for an attacker to inject HTML/XSS code by using 
a specifically crafted URL.

Solution
--------
- Upgrade to phpAdsNew or phpPgAds 2.0.8.


Contact informations
====================

The security contact for phpAdsNew and phpPgAds can be reached at:
<security AT phpadsnew DOT com>


Best regards
--
Matteo Beccati
http://phpadsnew.com
http://phppgads.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC