################################################ NukeET 'codigo' variable cross site scripting vendor url:http://www.truzone.org advisore:http://lostmon.blogspot.com/2005/05/ nukeet-codigo-variable-cross-site.html Vendor confirmed : yes exploit available: yes ################################################# NukeET Contains a flaw too that allows a remote cross site scripting attack.This flaw exists because the application does not validate 'codigo' variable upon submission to the 'catalog.php'scripts.This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server,leading to a loss of integrity. bug found by Suko , investigate and reporter by Lostmon. ########## versions ########## prior to 3.2 afected ########## solution: ########## vendor patch http://www.truzone.org/modules.php?name=Projet&op=getit&iddow=77 ########### timeline ########### discovered: 9 may 2005 vendor notify: 9 may 2005 vendor response : 10 may 2005 vendor fix: 10 may 2005 disclosure: 10 may 2005 ########## exploit: ########## 'codigo' variable acepts base64 url encode , if we encode for example