Secunia Security Advisory - Tem has reported a vulnerability in phpPgAds, which can be exploited by malicious people to conduct cross-site scripting attacks.
40071bb3a882ca30daa1e126643d423fc279f6c4959c72d5dd3c4836e2c2a3a1
TITLE:
phpPgAds "dest" Parameter HTTP Response Splitting Vulnerability
SECUNIA ADVISORY ID:
SA14051
VERIFY ADVISORY:
http://secunia.com/advisories/14051/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
phpPgAds 2.x
http://secunia.com/product/4577/
DESCRIPTION:
Tem has reported a vulnerability in phpPgAds, which can be exploited
by malicious people to conduct cross-site scripting attacks.
Input passed to the "dest" parameter is not properly sanitised. This
can be exploited to inject malicious characters into HTTP headers and
may allow execution of arbitrary HTML and script code in a user's
browser session in context of an affected site.
SOLUTION:
Update to version 2.0.2.
http://sourceforge.net/project/showfiles.php?group_id=36679
PROVIDED AND/OR DISCOVERED BY:
Tem
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------