Bugtraq mailing list archives

[eVuln] ExpressionEngine 'Referer' XSS Vulnerability


From: alex () evuln com
Date: 25 Jan 2006 16:50:53 -0000

New eVuln Advisory:
ExpressionEngine 'Referer' XSS Vulnerability
http://evuln.com/vulns/48/summary.html

--------------------Summary----------------

Software: ExpressionEngine
Sowtware's Web Site: http://www.pmachine.com
Versions: 1.4.1
Critical Level: Moderate
Type: Cross-Site Scripting
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0048

-----------------Description---------------
Vulnerable script: core.input.php

Variable $_SERVER['HTTP_REFERER'] isn't properly sanitized. This can be used to post HTTP query with fake Referer value 
which may contain arbitrary html or script code. This code will be executed when administrator(or any user) will open 
Referrers Statistics.

Administrator's session is threatened.


--------------Exploit----------------------
Available at: http://evuln.com/vulns/48/exploit.html


--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)


Current thread: