Description
uBidAuction 2.0.1 contains a reflected cross-site scripting vulnerability in the auctions/myAuctions/status/active module. The date_created, date_from, date_to, and created_at parameters in the filter functionality are not properly sanitized, allowing remote attackers to inject malicious scripts via crafted GET requests that execute in victims' browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
2.0.1
Credits
Vulnerability-Lab [Research Team]
References
www.exploit-db.com/exploits/50693 (Exploit-DB)
www.vulnerability-lab.com/get_content.php?id=2289 (Vulnerability Lab Advisory)
www.apphp.com/...auction-php-classic-and-bid-auctions-script (Product Homepage)
www.vulncheck.com/...auction-myauctions-active-reflected-xss (VulnCheck Advisory: uBidAuction 2.0.1 myAuctions active Reflected XSS)