Siteman 2.0.x2 - 'module' Cross-Site Scripting / Local File Inclusion
Author: Khashayar Fereidani
type: webapps
platform: php
port:
date_added: 2008-04-26
date_updated: 2016-12-02
verified: 1
codes: CVE-2008-2082;OSVDB-44842
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comSiteman2.0.x2.zip
source: https://www.securityfocus.com/bid/28943/info
Siteman is prone to a local file-include vulnerability and a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this as a cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Or, the attacker may exploit the issue as a local file-include vulnerability to view files and execute local scripts in the context of the webserver process. This may aid in further attacks.
Siteman 2.0.x2 is vulnerable; other versions may also be affected.
http://www.example.com/siteman2/index.php?module=[XSS]