[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

TaskFreak 0.6.4 Cross Site Scripting

Author
Canberk BOLAT
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-19600
Category
web applications
Date add
21-10-2012
Platform
php
Information
--------------------
Name :  XSS Vulnerabilities in TaskFreak
Software :  TaskFreak 0.6.4 and possibly below.
Vendor Homepage :  http://www.taskfreak.com
Vulnerability Type :  Cross-Site Scripting
Severity :  Critical
Researcher :  Canberk Bolat
Advisory Reference :  NS-12-011

Description
--------------------
TaskFreak! Original is a simple but efficient web based task manager
written in PHP.
Originally created in September 2005, many talented developers have
since contributed to translate and extend the original version. It is
now available in 24 languages.

Details
--------------------
TaskFreak is affected by XSS vulnerabilities in version 0.6.4;

index.php (dir, show, sort, sContext) – XSS
index.php (sContext) - Stored XSS
You can read the full article about Cross-Site Scripting from here:

Cross-site Scripting (XSS)
Solution
--------------------
No fix.

Advisory Timeline
--------------------
23/01/2011 - First contact
30/01/2011 - Sent the vulnerability details
16/08/2012 - Second contact - No reply
19/10/2012 - Advisory released

Credits
--------------------
It has been discovered on testing of Netsparker, Web Application
Security Scanner - http://www.mavitunasecurity.com/netsparker/.

References
--------------------
Vendor Url / Patch : -
MSL Advisory Link :
http://www.mavitunasecurity.com/xss-vulnerabilities-in-taskfreak/
Netsparker Advisories : http://www.mavitunasecurity.com/netsparker-advisories/


#  0day.today [2024-11-15]  #