## Exploit:
- The vuln is in the search section,it don't validate the imput.
To exploit this vuln you simply need an Internet Browser,you must only use a cookie
logger to get the Portal cookies.
To know if it is vulnerable: <script>alert('This is an XSS Vulnerability')</script>
## Dork: Interactive software released under GNU GPL, Code Credits, Privacy Policy
One simply needs to ensure javascript does not run (or runnable) via the search page form. Removing <script> should disallow javascript from being executed.
General disabling of javascript in your browser will have no affect on this.
Proper sanitization of search form fields would also correct this.
I did not fully inspect the downloads to see if there was a patch that wasn't mentioned in this forum. But I'm surprised this still hasn't been addressed. This has been a known issue for a long time.
For the record, the only variable not being checked was what displayed the person's search string to himself on the string. No vulnerable variables were passed to the DB, so my thought is the person could only mess himself up.
It wasn't a real bad vulnerability. Am I right?
Server specs (Server OS / Apache / MySQL / PHP / DragonflyCMS):
Unix / 2.0.46 (Red Hat) / 0.9.7a / 4.1.9-standard / 4.3.2 / 9.0.6.1
For the record, the only variable not being checked was what displayed the person's search string to himself on the string. No vulnerable variables were passed to the DB, so my thought is the person could only mess himself up.
It wasn't a real bad vulnerability. Am I right?
It creates an XSS exploit condition. A user can post a URL with javascript included in the query, and then run that javascript in the sandbox of any user who clicks on that URL.
I won't give details, however this could, for example, allow a malicious user to steal any account, including admin login provledges. So it's pretty bad.
Server specs (Server OS / Apache / MySQL / PHP / DragonflyCMS):
Linux 2.4.27/1.3.33/4.0.21-log/4.3.10/9.0 RC1
For the record, the only variable not being checked was what displayed the person's search string to himself on the string. No vulnerable variables were passed to the DB, so my thought is the person could only mess himself up.
It wasn't a real bad vulnerability. Am I right?
It creates an XSS exploit condition. A user can post a URL with javascript included in the query, and then run that javascript in the sandbox of any user who clicks on that URL.
I won't give details, however this could, for example, allow a malicious user to steal any account, including admin login provledges. So it's pretty bad.
I think you're wrong because the DB selects were using a different variable. This non-sanitized variable was only used to display to the screen, other variables hit the Database.
I know about the xss methods, but for personal knowledege, I still fail to see what a person could have done with this other than display to themselves the exploit.
Server specs (Server OS / Apache / MySQL / PHP / DragonflyCMS):
Unix / 2.0.46 (Red Hat) / 0.9.7a / 4.1.9-standard / 4.3.2 / 9.0.6.1