PostNuke Phoenix 0.726 - 'openwindow.php?hlpfile' Cross-Site Scripting
Author: Janek Vind
type: webapps
platform: php
port: nan
date_added: 2004-04-21
date_updated: 2013-01-11
verified: 1
codes: CVE-2004-1957;OSVDB-5630
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/10191/info
Multiple vulnerabilities were reported to exist in PostNuke Phoenix. The following specific vulnerabilities were reported:
- Multiple path disclosure vulnerabilities that occur when a user directly requests scripts in the "/includes/blocks/" and "pnadodb" directories. This issue also affects scripts that are associated in multiple modules.
- Multiple cross-site scripting vulnerabilities were reported in the Downloads and Web_Links modules as well as the openwindow.php script. These issues may permit remote attackers to cause hostile HTML and script code to be interpreted by a victim user's browser.
http://www.example.com/postnuke0726/javascript/openwindow.php?hlpfile=x<html><body>[xss code here]
http://www.example.com/postnuke0726/javascript/openwindow.php?hlpfile=x<html><body%20onload=alert(document.cookie);>