Forum Thread: Website Baker "lang" Cross-Site Scripting Vulnerability

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:

See the original Secunia advisory:
Website Baker "lang" Cross-Site Scripting Vulnerability

Secunia Website Baker "lang" Cross-Site Scripting Vulnerability
Secunia Official 21st May, 2014 11:57
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
Sammy Forgit has discovered a vulnerability in Website Baker, which can be exploited by malicious people to conduct cross-site scripting attacks.

Input passed to the "lang" parameter in include/idna_convert/example.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability is confirmed in version 2.8.3 SP1. Other versions may also be affected.

DarkViper RE: Website Baker "lang" Cross-Site Scripting Vulnerability
Member 21st May, 2014 11:57
Score: 0
Posts: 1
User Since: 14th Oct 2010
System Score: N/A
Location: DE
Last edited on 21st May, 2014 11:57
is an example file from the 3rd party idna_convert packet only an has no connection to anything of WebsiteBaker.
From Wb-2.8.4 it's inside a zip file and the packet itself is set deprecated for furter versions.
Was this reply relevant?