vendor:
Linpha
by:
killall-9@mail.com
8,8
CVSS
HIGH
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF)
79
CWE
Product Name: Linpha
Affected Version From: 1.3.4
Affected Version To: 1.3.4
Patch Exists: YES
Related CWE: N/A
CPE: a:linpha:linpha:1.3.4
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Virtualbox (debian) and Apache
2014
linPHA 1.3.4 – Pemanent XSS and CSRF
The vulnerability exists due to improper validation of user-supplied input in the 'friend_user_name', 'friend_full_name' and 'friend_user_mail' parameters of the 'submit_mod_data.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary HTML and script code in the browser of the unsuspecting user in context of the vulnerable website. An attacker can also leverage CSRF to perform certain actions with the privileges of the targeted user, if the user has an active session and is induced to click a malicious link.
Mitigation:
Update to version 1.3.5 or later, or apply the patch from the vendor.