e107 website system 0.7.5 signup.php Query String (PATH_INFO) Parameter XSS

Gerardo Vazquez, Eduardo Arriols 13.09.2006 Verified
Web Application Exploits PHP

Exploit Code

source: http://www.securityfocus.com/bid/19997/info
      
e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. 
      
An attacker may levearge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
      
Version 0.7.5 is vulnerable to this issue; other versions may also be affected.

http://www,example.com/signup.php/"><script>alert('founded by pointGLow.com - zark0vac')</script>