MySQL Eventum index.php email Parameter XSS

medium Nessus Plugin ID 16093

Synopsis

The remote web server hosts a PHP application that is affected by a cross-site scripting vulnerability.

Description

The MySQL Eventum install hosted on the remote web server is vulnerable to a cross-site scripting attack because it fails to sanitize user-supplied input to the 'email' parameter of the 'index.php' script before using it to generate dynamic HTML output.

With a specially crafted URL, an attacker can use the remote server to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site.

Note that this install is also likely to be affected by several other similar cross-site scripting vulnerabilities, although Nessus has not checked for them.

Solution

Upgrade to MySQL Eventum 1.4 or later.

See Also

https://cirt.net/MySQL+Eventum

https://bugs.mysql.com/bug.php?id=7552

Plugin Details

Severity: Medium

ID: 16093

File Name: mysql_eventum_flaws.nasl

Version: 1.22

Type: remote

Published: 1/3/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:mysql:eventum

Required KB Items: www/PHP, www/eventum

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/28/2004

Reference Information

BID: 12133

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990