[原文]Cross-site scripting (XSS) vulnerability in forgotPassword.asp in Helm Hosting Control Panel 3.2.8 and earlier allows remote attackers to inject arbitrary web script or HTML via the txtEmailAddress parameter.
Helm Control Panel forgotPassword.asp txtEmailAddress Parameter XSS
Remote / Network Access
Loss of Integrity
Helm Web Hosting Control Panel contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'txtEmailAddress' variable upon submission to the 'forgotPassword.asp' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version 3.2.9 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
M.Neset KABAKLI is credited with the discovery of this vulnerability.
Web Host Automation Ltd. Helm 3.2.8
Helm is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Version 3.2.8 is reported vulnerable; other versions may also be affected.