VID |
21822 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The phpScheduleIt, according to its version number, has cross-site scripting vulnerabilities in the registration page. phpScheduleIt is an open-source Web-based reservation and scheduling system written in PHP. phpScheduleIt version 1.0.0 RC1 and possibly other versions could allow a remote attacker to inject arbitrary web script or HTML via the Name or Lastname fields during new user registration, or the Schedule Name field. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of phpScheduleIt installed on the remote Web server to assess this vulnerability.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-09/0216.html http://archives.neohapsis.com/archives/bugtraq/2004-08/0417.html http://www.osvdb.org/9451 http://www.securityfocus.com/archive/1/373603/2004-08-28/2004-09-03/0
* Platforms Affected: BrickHost, phpScheduleIt version 1.0.0 RC1 and possibly other versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of phpScheduleIt (1.0.0 or later), available from the phpScheduleIt Web site at http://www.php.brickhost.com/ |
Related URL |
CVE-2004-1651 (CVE) |
Related URL |
11080 (SecurityFocus) |
Related URL |
17193,17194 (ISS) |
|