Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> phpWebLog Cross Site Scripting

Vulnerability Assessment Details

phpWebLog Cross Site Scripting

Vulnerability Assessment Summary
Searches for the existence of a phpWebLog XSS

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains PHP scripts that are prone to several
flaws, including possibly arbitrary code execution.

Description :

The remote host is running phpWebLog, a news and content management
system written in PHP.

Due to improper filtering done by 'search.php' a remote attacker can
cause the phpWebLog product to include arbitrary HTML and/or JavaScript.
A possible hacker may use this bug to perform a cross site scripting attack
using the remote host. There are also reportedly two flaws that, if
PHP's 'register_globals' setting is enabled, permit for local file
disclosure and arbitrary code execution.

See also :

Solution :

Disable this script.

Risk factor:

Medium / CVSS Base Score : 6

Networks Security ID: 12747

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Noam Rathaus

Cables, Connectors


No Discussions have been posted on this vulnerability.