Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PWSPHP XSS


Vulnerability Assessment Details

PWSPHP XSS

Vulnerability Assessment Summary
Checks XSS in PWSPHP

Detailed Explanation for this Vulnerability Assessment

The remote host runs PWSPHP (Portail Web System) a CMS written in PHP.

The remote version of this software is vulnerable to cross-site
scripting attack due to a lack of sanity checks on the 'skin' parameter
in the script SettingsBase.php.

With a specially crafted URL, a possible hacker could use the remote server
to set up a cross site script attack.

Solution: Upgrade to version 1.2.3 or newer
Network Security Threat Level: Medium

Networks Security ID: 13561, 13563

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 David Maciejak

Cables, Connectors

Pair of IBM 46J6702 8202-E4B Power 720 3.0GHz 4 Core Server CPU Processors
$29.99
Pair of IBM 46J6702 8202-E4B Power 720 3.0GHz 4 Core Server CPU Processors  pictureIBM 06H8576 BACKPLANE 6x SCSI PC SERVER 330
$49.52
IBM 06H8576 BACKPLANE 6x SCSI PC SERVER 330 pictureIBM xSeries 335 330 1U Server Rack Mount Rails 32P9108 32P9109
$8.0
IBM xSeries 335 330 1U Server Rack Mount Rails 32P9108 32P9109 pictureMOTHERBOARD IBM 43W8250 xSERIES x3650 SERVER motherboard
$466.03
MOTHERBOARD IBM 43W8250 xSERIES x3650 SERVER motherboard picture


Discussions

No Discussions have been posted on this vulnerability.