CuteNews 1.4.6 - 'result' Cross-Site Scripting

Author: Andrew Horton
type: webapps
platform: php
port: 
date_added: 2009-11-10  
date_updated: 2016-12-08  
verified: 1  
codes: CVE-2009-4250;OSVDB-60910  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 33343.txt  
source: https://www.securityfocus.com/bid/36971/info

CuteNews and UTF-8 CuteNews are prone to multiple vulnerabilities, including cross-site scripting, HTML-injection, information-disclosure, arbitrary-script-injection, and security-bypass issues.

Note that exploits for some of the issues may require administrator privilege.

Successful exploits may allow attackers to:
- obtain sensitive information
- gain unauthorized access to the affected application
- run arbitrary script code in the browser of an unsuspecting user in the context of the affected site
- hijack user sessions
- execute arbitrary commands in the context of the webserver process

A successful attack will compromise the application and may aid in further attacks.

http://www.example.com/test/cutenews/register.php?result=%3Cscript%3Ealert(/XSS/);%3C/script%3E