Multiple cross-site scripting (XSS) vulnerabilities in TorrentTrader Classic 1.09 allow remote authenticated users to inject arbitrary web script or HTML via (1) the Title field to requests.php, related to viewrequests.php; and (2) the Torrent Name field to torrents-upload.php, related to the logging of torrent uploads; and allow remote attackers to inject arbitrary web script or HTML via (3) the ttversion parameter to themes/default/footer.php, the (4) SITENAME and (5) CURUSER[username] parameters to themes/default/header.php, (6) the todayactive parameter to visitorstoday.php, (7) the activepeople parameter to visitorsnow.php, (8) the faq_categ[999][title] parameter to faq.php, and (9) the keepget parameter to torrents-details.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/51145 | vdb entry |
http://secunia.com/advisories/35456 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/35369 | vdb entry exploit |
https://www.exploit-db.com/exploits/8958 | exploit |
http://www.securityfocus.com/archive/1/504294/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51144 | vdb entry |
http://www.waraxe.us/advisory-74.html | exploit |