Full Disclosure mailing list archives
[HTTPCS] phpMyNewsletter Multiple Vulnerabilities
From: HTTPCS <contact () httpcs com>
Date: Sun, 2 Dec 2012 19:36:26 +0100 (CET)
HTTPCS Advisory : HTTPCS116 Product : phpMyNewsletter Version : v0.8 Page : /admin/?page=subscribers Variables : page=[VulnHTTPCS] Type : XSS Method : POST Description : A vulnerability has been discovered in phpMyNewsletter, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'page' parameter to '/admin/?page=subscribers' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. References : https://www.httpcs.com/advisory/httpcs116 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS115 Product : phpMyNewsletter Version : v0.8 Page : /admin/index.php Variables : page=[VulnHTTPCS] Type : XSS Method : GET Description : A vulnerability has been discovered in phpMyNewsletter, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'page' parameter to '/admin/index.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. References : https://www.httpcs.com/advisory/httpcs115 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ HTTPCS Advisory : HTTPCS114 Product : phpMyNewsletter Version : v0.8 Page : /subscription.php Variables : popup=[VulnHTTPCS] Type : XSS Method : POST Description : A vulnerability has been discovered in phpMyNewsletter, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'popup' parameter to '/subscription.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. References : https://www.httpcs.com/advisory/httpcs114 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ https://www.httpcs.com/advisories _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Free web vulnerability scanner HTTPCS : https://www.httpcs.com/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [HTTPCS] phpMyNewsletter Multiple Vulnerabilities HTTPCS (Dec 02)