PHP-Nuke MyHeadlines Module *myh_op* Cross-Site Scripting

Posted on Monday, September 04, 2006 @ 05:49:57 CDT in Security
by Raven

TITLE: PHP-Nuke MyHeadlines Module "myh_op" Cross-Site Scripting

SECUNIA ADVISORY ID: SA21653

VERIFY ADVISORY: http://secunia.com/advisories/21653/

CRITICAL: Less critical

IMPACT: Cross Site Scripting

WHERE: >From remote

SOFTWARE: MyHeadlines 4.x (module for PHP-Nuke)- http://secunia.com/product/11722/

DESCRIPTION: Thomas Pollet has discovered a vulnerability in the MyHeadlines module for PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "myh_op" parameter in modules.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Example: http://[host]/modules.php?op=modload&name=MyHeadlines&file=index&myh=user&myh_op=show_all[code]&eid=2474

The vulnerability has been confirmed in version 4.3.1. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: Thomas Pollet
 
 
click Related        click Share
 
 

Re: PHP-Nuke MyHeadlines Module *myh_op* Cross-Site Scripting (Score: 1)
by hitwalker on Monday, September 04, 2006 @ 10:00:48 CDT
  
(User Info | Send a Message)

and we just published a story...?
MyHeadlines v4.3.xx: the great NewsScraper and Headlines-grabber

that hurts...

 
News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,130,178
  • Today: 196,373
Server InfoServer Info
  • Apr 23, 2025
  • 05:43 pm CDT