Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CWE-89 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2005-12-31 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H | 0.02192 | 0.50148 |
Product Description: The core of this script is based on paFileDB 3.1 but with alot features (that`s why i call it Extreme Edition). These are some of the features: - 4 level sub category - 3 different ways to calculate the filesize of a file (so that the script can run on free servers to) - highly advanced screenshot/thumbnailing settings - download screenshots to your server (if supported) - show thumbnails in the category and viewall view - tons of settings that you can change in the admin panel (no need to edit the source or edit sql query`s by hand) - build in news management/system page numbers if there are a x number reply`s - small logging system (for adding/editing/deleting things) - secured comment system - advanced settings for the comments system like br`s and smily`s Feel free to test it!! it`s FREE Vuln. Description: paFileDB Extreme Edition contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed "newsid" "id" in "pafiledb.php" isn't properly sanitised before being returned to the user. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. examples: /pafiledb.php?news=showcontent&newsid=[SQL] /pafiledb.php?action=category&id=[SQL] Solution: Edit the source code to ensure that input is properly sanitised.
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.