Xinha 0.96 - 'spell-check-savedicts.php' Multiple HTML Injection Vulnerabilities
Author: John Leitch
type: webapps
platform: php
port:
date_added: 2011-03-10
date_updated: 2014-12-02
verified: 1
codes: CVE-2011-5267;OSVDB-71070
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/46825/info
Xinha is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
Xinha 0.96.1 is vulnerable; prior versions may also be affected. Note that applications that use vulnerable versions of Xinha may also be affected.
http://www.example.com/wikiwig5.01/_wk/Xinha/plugins/SpellChecker/spell-check-savedicts.php?to_r_list=%3Cscript%3Ealert(0)%3C%2fscript%3E