mooSocial Cross-Site Scripting and SQL Injection Vulnerabilities
Description
Esac has reported multiple vulnerabilities in mooSocial, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
1) Input appended to the URL after blogs/view is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Input appended to the URL after tags/view, albums/ajax_browse, blogs/ajax_browse, topics/ajax_browse, groups/ajax_browse, videos/ajax_browse, and groups/view is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
3) Input passed via the "source_id" POST parameter to videos/ajax_embed is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The vulnerabilities are reported in version 1.3.3. Other versions may also be affected.