[原文]Cross-site scripting (XSS) vulnerability in pafiledb.php in PHP Arena paFileDB 1.1.3 through 3.0 allows remote attackers to inject arbitrary web script or HTML via the query string in the (1) rate, (2) email, or (3) download actions.
PHP Arena paFileDB is prone to cross-site scripting attacks.
An attacker may construct a malicious link to the vulnerable script which contains arbitrary HTML and script code. If this link is visited by a web user, the attacker-supplied code will execute in their web client in the security context of the paFileDB site.
This issue is in the "Email to Friend" function of the paFileDB script.
paFileDB contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the 'id' parameter (when the 'action' parameter is set to 'rate', 'email', or 'download') upon submission to the 'pafiledb.php' script. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
Currently, there are no known upgrades, patches or workarounds available to correct this vulnerability.