header-logo
Suggest Exploit
vendor:
PHP Web Statistik
by:
5.5
CVSS
MEDIUM
Content Injection
79
CWE
Product Name: PHP Web Statistik
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

PHP Web Statistik Content Injection Vulnerabilities

PHP Web Statistik is prone to multiple content injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. The vulnerabilities could allow for HTML injection and cross-site scripting attacks. An attacker may leverage these issues to have arbitrary script and HTML code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials, and also exploit these issues to control how the site is rendered to the user. Examples for cross-site scripting and HTML injection attacks have been provided.

Mitigation:

To mitigate these vulnerabilities, it is recommended to implement proper input validation and sanitization techniques. Input should be validated and sanitized before being used in any dynamic content generation. It is also advised to keep PHP Web Statistik up to date with the latest security patches.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15603/info

PHP Web Statistik is prone to multiple content injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. The vulnerabilities could allow for HTML injection and cross-site scripting attacks.

An attacker may leverage these issues to have arbitrary script and HTML code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials, and also exploit these issues to control how the site is rendered to the user. 

Examples for cross-site scripting and HTML injection attacks have been provided:

http://www.example.com/stat.php?lastnumber=urlencoded%20text

curl -A Opera http://www.example.com/stat/pixel.php -e
?<a href=http://www.example.com>go-google</a>?

curl -A Opera http://www.example.com/stat/pixel.php -e
?<script>alert(123123);</script>?