SB2015052805 - Multiple vulnerabilities in PHPWind.Net PHPWind
Published: May 28, 2015 Updated: August 9, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2015-4135)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in goto.php in phpwind 8.7 when processing url parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Input validation error (CVE-ID: CVE-2015-4134)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Open redirect vulnerability in goto.php in phpwind 8.7 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter. <a href="http://cwe.mitre.org/data/definitions/601.html">CWE-601: URL Redirection to Untrusted Site ('Open Redirect')</a>
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://packetstormsecurity.com/files/132030/phpwind-8.7-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2015/May/106
- http://tetraph.com/security/xss-vulnerability/phpwind-v8-7-xss/
- http://www.securityfocus.com/bid/74804
- http://www.securitytracker.com/id/1032427
- http://packetstormsecurity.com/files/132033/phpwind-8.7-Open-Redirect.html
- http://seclists.org/fulldisclosure/2015/May/107
- http://tetraph.com/security/open-redirect/phpwind-v8-7-open-redirect/
- http://www.securitytracker.com/id/1032428