News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunis.com:
Travelsized CMS index.php Cross-Site Scripting Vulnerabilities
November 22, 2006 @ 08:09:00

According to this security release from Secunia, there's a cross-site scripting vulnerability with the Travelsized CMS package (PHP-based) in the main index file.

David Vieira-Kurz has discovered some vulnerabilities in Travelsized CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

The problem comes from the input parameters "page" and "langauge" not being verified and sanitized. Users are encouraged to go in and manually edit the source to correct the problem as there is no patch currently posted as of yet. You can get complete information about this issue from the full Secunia report.

0 comments voice your opinion now!
vulnerability security crosssitescripting xss sanitize input vulnerability security crosssitescripting xss sanitize input


blog comments powered by Disqus

Similar Posts

David Müller: Why URL validation with filter_var might not be a good idea

PHPit.net: PHP Security - Basic PHP Security

Secunia.com: PHP Integer Overflow Vulnerability and Security Bypass

Mattias Geniar's Blog: Input Validation: Using filter_var() Over Regular Expressions

PHP.net: PHP 5.4.5 and PHP 5.3.15 released!


Community Events





Don't see your event here?
Let us know!


api podcast introduction package release zendserver deployment community symfony series framework tips opinion install laravel unittest update interview language library

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework