W-Agora 4.2.1 - 'search.php?search_user' Cross-Site Scripting
Author: laurent gaffie
type: webapps
platform: php
port:
date_added: 2007-03-20
date_updated: 2013-11-21
verified: 1
codes: CVE-2007-1606;OSVDB-34378
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/23057/info
w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
w-Agora 4.2.1 is vulnerable.
http://www.example.com/w-agora/search.php?bn=hello_hello&gosearch=1&pattern=1&search_date=0&search_fields[body]=1&search_fields[ subject]=1&search_forum=hello_hello&search_mode=0&search_user='"><script>alert(document.cookie)</script>