Korean
<< Back
VID 21822
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The phpScheduleIt, according to its version number, has cross-site scripting vulnerabilities in the registration page. phpScheduleIt is an open-source Web-based reservation and scheduling system written in PHP. phpScheduleIt version 1.0.0 RC1 and possibly other versions could allow a remote attacker to inject arbitrary web script or HTML via the Name or Lastname fields during new user registration, or the Schedule Name field. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of phpScheduleIt installed on the remote Web server to assess this vulnerability.

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-09/0216.html
http://archives.neohapsis.com/archives/bugtraq/2004-08/0417.html
http://www.osvdb.org/9451
http://www.securityfocus.com/archive/1/373603/2004-08-28/2004-09-03/0

* Platforms Affected:
BrickHost, phpScheduleIt version 1.0.0 RC1 and possibly other versions
Any operating system Any version
Recommendation Upgrade to the latest version of phpScheduleIt (1.0.0 or later), available from the phpScheduleIt Web site at http://www.php.brickhost.com/
Related URL CVE-2004-1651 (CVE)
Related URL 11080 (SecurityFocus)
Related URL 17193,17194 (ISS)