Advertisement






XAMPP 'adodb.php' cross-site scripting vulnerability

CVE Category Price Severity
CVE-2020-25327 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2008-10-07
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0.03291 0.61315

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2008100014

Below is a copy:

Title XAMPP 'adodb.php' cross-site scripting vulnerability
Author(s)
Jaykishan Nirmal from Aujas Networks
Release Date:
29th September, 2008

Systems Affected
- Web browsers
- Web servers that dynamically generate pages based on un-validated input

Class
Input Validation Error

Background
Most web browsers have the capability to interpret scripts embedded in web pages
downloaded from a web server. Such scripts may be written in a variety of scripting languages
and are run by the client's browser. Most browsers are installed with the capability to run
scripts enabled by default.

Risk
Medium to High

Remotely Exploitable
Yes

Locally Exploitable
Yes

Vulnerable File
http://www.example.com/xampp/adodb.php

Vulnerable Versions:
XAMPP v1.6.8 (Others might be affected)

Platform:
Windows (Others might be affected)

Technical Details
In PHP-script called 'adodb.php', input text-boxes are vulnerable to cross-site scripting attack
An attacker may leverage this issue to execute arbitrary script code in the browser of an
unsuspecting user in the context of the affected site. This may help the attacker steal cookiebased
authentication credentials and launch other attacks
This issue is due to a failure of the application to properly sanitize user-supplied input prior to
including it in dynamically generated Web content.

Impact
Cross site scripting

Solution
Edit the source code to ensure the input is properly sanitized.
Report Timeline(s)
26-09-2008: Aujas Networks notifies XAMPP development team about vulnerability

Reference(s)
XAMPP Home Page - http://www.apachefriends.org/en/xampp.html
Security Focus - http://www.securityfocus.com/bid/31472

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum