Pecio CMS 'target' Parameter Cross Site Scripting Vulnerability

Published: 2010-11-23 13:41:37

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Detection Type:
Remote Vulnerability

Impact:
Successful exploitation could allow an attacker to execute arbitrary HTML code in a user's browser session in the context of a vulnerable application.

Affected Versions:
Pecio CMS v2.0.5 and prior.

Technical Details:
Input passed via the 'target' parameter in 'search' action in index.php is not properly verified before it is returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of a vulnerable site. This may allow an attacker to steal cookie-based authentication credentials and launch further attacks.

Recommendations:
No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.

Summary:
The host is running Pecio CMS and is prone to Cross-Site Scripting vulnerability.

Solution Type:
Vendor will not fix

SecurityFocus Bugtraq ID:

https://www.securityfocus.com/bid/44304

References:

http://pecio-cms.com/
http://secpod.org/blog/?p=137
http://www.securityfocus.com/archive/1/514404
http://secpod.org/advisories/SECPOD_pecioCMS_XSS.txt

Search
Severity
Medium
CVSS Score
5.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.