[原文]Cross-site scripting (XSS) vulnerability in genmessage.php in Accounting Receiving and Inventory Administration (ARIA) 0.99-6 allows remote attackers to inject arbitrary web script or HTML via the Message Field (message parameter).
ARIA (Accounting Receiving and Inventory Administration) genmessage.php Message Field XSS
Remote / Network Access
Loss of Integrity
ARIA (Accounting Receiving and Inventory Administration) contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the Message Field (message variable) upon submission to the genmessage.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
email@example.com is credited with the discovery of these vulnerabilities.
OZJournals OZJournals 1.5
OZJournal is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.
Attackers can exploit these issues via a web client.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: firstname.lastname@example.org:email@example.com.