Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11757
HistoryMar 09, 2006 - 12:00 a.m.

[SA19155] HitHost Cross-Site Scripting and Directory Deletion

2006-03-0900:00:00
vulners.com
15

TITLE:
HitHost Cross-Site Scripting and Directory Deletion

SECUNIA ADVISORY ID:
SA19155

VERIFY ADVISORY:
http://secunia.com/advisories/19155/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting, Manipulation of data

WHERE:
>From remote

SOFTWARE:
HitHost 1.x
http://secunia.com/product/8604/

DESCRIPTION:
retard has discovered two vulnerabilities in HitHost, which can be
exploited by malicious people to delete empty directories and conduct
cross-site scripting attacks.

1) Input passed to the "hits" parameter in "viewuser.php" and the
"user" parameter in "deleteuser.php" isn't properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.

2) Input passed to the "user" parameter in "deleteuser.php" isn't
properly sanitised before being used to delete directories. This can
be exploited to delete arbitrary empty directories via directory
traversal attacks.

The vulnerabilities have been confirmed in version 1.0.0. Other
versions may also be affected.

SOLUTION:
Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY:
retard


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.