[原文]Multiple cross-site scripting (XSS) vulnerabilities in Pivot 1.30 RC2 and earlier, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) fg, (2) line1, (3) line2, (4) bg, (5) c1, (6) c2, (7) c3, and (8) c4 parameters in (a) includes/blogroll.php; (9) name and (10) js_name parameters in (b) includes/editor/edit_menu.php; and, even if register_globals is not enabled, the (11) h and (12) w parameters in (c) includes/photo.php.
Pivot contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'fg', 'line1', 'line2', 'bg', 'c1', 'c2', 'c3', and 'c4' variables upon submission to the blogroll.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
rgod is credited with the discovery of these vulnerabilities.
Pivot Pivot 1.3.0 RC2
Pivot Pivot 1.3
Pivot Pivot 1.3
Pivot is prone to multiple input-validation vulnerabilities, including remote file-include, local file-include, cross-site scripting, and privilege-escalation issues. All of these issues are due to a failure in the application to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, execute remote PHP code in the context of the webserver process, and gain unauthorized privileges.
Pivot 1.30 RC2 and prior versions are vulnerable to this issue.
Attackers can exploit these issues through a web client.