Multiple cross-site scripting (XSS) vulnerabilities in FAQMasterFlexPlus, possibly 1.5 or 1.52, allow remote attackers to inject arbitrary web script or HTML via (1) the cat_name parameter to faq.php; and unspecified parameters to the (2) add categories, (3) edit categories, (4) delete categories, (5) add faq, (6) edit faq, and (7) delete faq Admin scripts.
FaqMasterFlexPlus is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.All versions of FaqMasterFlexPlus are considered vulnerable.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: firstname.lastname@example.org.
Attackers can exploit this issue by enticing an unsuspecting user to follow a malicious URI.The following proof of concept is available:http://www.example.com/[path/to/faq/]/faq.php?category_id=1&cat_name=[XSS]
|2008-01-04||CVE-2007-6634||SQL Injection vulnerability in Netbizcity Faqmasterflexplus||Medium|
|2008-01-04||CVE-2007-6635||Cryptographic Issues vulnerability in Netbizcity Faqmasterflexplus||Medium|