TITLE: PHP-Nuke MyHeadlines Module "myh_op" Cross-Site Scripting
SECUNIA ADVISORY ID: SA21653
VERIFY ADVISORY: http://secunia.com/advisories/21653/
CRITICAL: Less critical
IMPACT: Cross Site Scripting
WHERE: >From remote
SOFTWARE: MyHeadlines 4.x (module for PHP-Nuke)- http://secunia.com/product/11722/
DESCRIPTION: Thomas Pollet has discovered a vulnerability in the MyHeadlines module for PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "myh_op" parameter in modules.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Example: http://[host]/modules.php?op=modload&name=MyHeadlines&file=index&myh=user&myh_op=show_all[code]&eid=2474
The vulnerability has been confirmed in version 4.3.1. Other versions may also be affected.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY: Thomas Pollet
PHP-Nuke MyHeadlines Module *myh_op* Cross-Site Scripting
Posted on Monday, September 04, 2006 @ 05:49:57 CDT in Security
|
Internet Explorer URL Parsing Buffer Overflow Vulnerability
Posted on Wednesday, August 23, 2006 @ 06:50:41 CDT in Security
|
PHP Multiple Vulnerabilities
Posted on Friday, August 18, 2006 @ 17:14:24 CDT in Security
|
Mambo Coppermine Component File Inclusion Vulnerability
Posted on Thursday, August 17, 2006 @ 13:15:10 CDT in Security
|
Zen Cart SQL Injection and File Inclusion Vulnerabilities
Posted on Wednesday, August 16, 2006 @ 11:47:25 CDT in Security
|
Linux Kernel Multiple Vulnerabilities
Posted on Friday, August 11, 2006 @ 08:37:22 CDT in Security
|