Ravens PHP Scripts

PHP Link Directory *URL* Script Insertion Vulnerability
Date: Wednesday, January 24, 2007 @ 11:32:43 CET
Topic: Security


SECUNIA ADVISORY ID: SA23860

VERIFY ADVISORY: http://secunia.com/advisories/23860/

CRITICAL: Moderately critical

IMPACT: Cross Site Scripting

SOFTWARE:
PHP Link Directory (phpLD2) 2.x - http://secunia.com/product/7667/
PHP Link Directory (phpLD ) 3.x - http://secunia.com/product/13307/

DESCRIPTION: A vulnerability has been discovered in PHP Link Directory, which can be exploited by malicious people to conduct script insertion attacks.


Input passed to the form field "URL" in submit.php is not properly sanitised before being stored. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the offending data is viewed. The vulnerability is confirmed in version 2.1 on the 2.x branch and reported in version 3.0.6 on the 3.x branch. Other versions may also be affected.

SOLUTION: It is reported that version 3.1.0 on the 3.x branch fixes the issue. Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: Jussi Vuokko and Henri Lindberg

ORIGINAL ADVISORY: http://www.smilehouse.com/advisory/phplinkdirectory_070121.txt






This article comes from Ravens PHP Scripts
http://www.ravenphpscripts.com

The URL for this story is:
http://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2680