[原文]Multiple cross-site scripting (XSS) vulnerabilities in visview.php in aWebNews 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) yname, (2) emailadd, (3) subject, and (4) comment parameters.
aWebNews contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'yname', 'emailadd', 'subject', or 'comment' variables upon submission to the visview.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Aliaksandr Hartsuyeu is credited with the discovery of these vulnerabilities.
aWeb Labs aWebBB 1.2
aWebBB is prone to multiple input-validation vulnerabilities. The issues include cross-site scripting and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Successful exploitation of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
These issues can be exploited through a web client.
The following proof-of-concept example is available: