header-logo
Suggest Exploit
vendor:
Jinzora
by:
SecurityFocus
7.5
CVSS
HIGH
HTML-Injection and Cross-Site Scripting
79
CWE
Product Name: Jinzora
Affected Version From: 2.7.2005
Affected Version To: 2.7.2005
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Jinzora Multiple HTML-Injection and Cross-Site Scripting Vulnerabilities

Jinzora is prone to multiple HTML-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, and launch other attacks.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to generate unexpected HTML or script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/27876/info
   
Jinzora is prone to multiple HTML-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
   
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, and launch other attacks.
   
Jinzora 2.7.5 is vulnerable; other versions may also be affected. 

http://www.example.com/[installdir]/popup.php?ptype=sitenew&siteNewsData = &lt;/textarea&gt;<script>alert(&#039;DSecRG XSS&#039;)</script>
http://www.example.com/[installdir]/popup.php?ptype=playlistedit&query = <script>alert(&#039;DSecRG XSS&#039;)</script>
http://www.example.com/[installdir]/popup.php?theme=<IMG SRC="javascript:alert(&#039;DSecRG XSS&#039;)">