[原文]Cross-site scripting (XSS) vulnerability in view.php in YaPiG 0.92b, 0.93u and 0.94u allows remote attackers to inject arbitrary web script or HTML via (1) the phid parameter or (2) unknown parameters when posting a new comment.
YaPiG contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the phid variable, as well as some unspecified variables, upon submission to the view.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
This vulnerability was discovered by an anonymous person. SecWatch reported this vulnerability.
YaPiG YaPig 0.94 u
YaPiG YaPig 0.93 u
YaPiG YaPig 0.92 b
YaPiG is prone to multiple HTML injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input prior to using it in dynamically generated content.
Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.
This issue is reported to affect YaPiG versions 0.92b, 0.93u and 0.94u; earlier versions may also be affected.
No exploit is required.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.