Simple PHP Blog (SPHPBlog) search.php q Parameter XSS
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Simple PHP Blog contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'q' variables upon submission to the 'search.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
y3dips is credited with the discovery of this vulnerability.
sphpBlog sphpBlog 0.4 .0
sphpBlog is affected by a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
This issue is reported to affect sphpBlog version 0.4.0; earlier versions may also be vulnerable.
No exploit is required.
The following proof of concept URIs are available: http://www.example.com/sphpblog/search.php?q=[XSS] http://www.example.com/sphpblog/search.php?q=%3Cmarquee%3Ewe+are+a+like%3C%2Fmarquee%3E http://www.example.com/sphpblog/search.php?q=<a href=http://echo.or.id>echo</a>
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.