Minigal 2 aka MG2 is susceptible to a cross site scripting vulnerability.
7071f2f99cf637a797b9a2f46856d30ae239eed5ae3348826fa97fc38c0b2d7d
Title: Minigal 2 critical XSS
Author: Jose Carlos Norte (jose@eyeos.org)
Date: 4-3-2008
Severity: high
Vendor URL: http://www.minigal.dk/
------- Introduction
Minigal 2(a.k.a. MG2) is a picture album written in PHP, it have a simple administration panels, and makes non-ajax browsable albums.
------- The problem
The problem consist in a fully exploitable XSS. MG2 allows NON-Admin users to browser some areas of the admin panel, and one of these, have a XSS problem.
------- Exploitation
admin.php?action=import&list=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
------- Status
Vendor contacted without response.
------- Credits
This bug was discovered by Jose Carlos Norte, (jose@eyeos.org).