vendor:
by:
Sweet
7.5
CVSS
HIGH
Stored XSS, CSRF
CWE
Product Name:
Affected Version From: 1.7.2003
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows XP SP3
2010
pixelpost_v1.7.3 Multiple vulnerabilities
The software version 1.7.3 of pixelpost is vulnerable to stored XSS and CSRF attacks. The 'Image Title' and 'tags' parameters in the admin login page are vulnerable to stored XSS. An attacker can inject malicious code, such as <script>alert('sweet')</script>, to execute arbitrary JavaScript code. Additionally, the admin password change functionality is vulnerable to CSRF. An attacker can change the admin password by sending a crafted request to the 'options' endpoint.
Mitigation:
Upgrade to a version higher than 1.7.3, if available. Apply necessary patches and security updates. Use input validation and output encoding to prevent XSS attacks. Implement CSRF protection mechanisms, such as using CSRF tokens.