VID |
21723 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of phpPgAds/phpAdsNew which is older than version 2.0.2 is detected as installed on the host. phpPgAds and phpAdsNew are a banner management and tracking system that uses PostgreSQL as a database backend written in PHP. phpPgAds and phpAdsNew versions prior to 2.0.2 are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the dest parameter in a URL request. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of phpPgAds or phpAdsNew on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/14051/
* Platforms Affected: SourceForge.net, phpPgAds versions prior to 2.0.2 SourceForge.net, phpAdsNew versions prior to 2.0.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of phpPgAds or phpAdsNew (2.0.2 or later), available from the following SourceForge.net Web sites:
For phpPgAds: http://prdownloads.sourceforge.net/phppgads
For phpAdsNew: http://prdownloads.sourceforge.net/phpadsnew |
Related URL |
(CVE) |
Related URL |
12398 (SecurityFocus) |
Related URL |
19136 (ISS) |
|