DESCRIPTION: Maestro has reported a vulnerability in Snitz Forums 2000, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks.
Input passed to the "location" parameter in "/down.asp" isn't properly sanitised before being used in a HTTP header. This may allow execution of arbitrary HTML and script code in a user's browser session associated with an affected site.
This can also be exploited to perform web cache poisoning.
The vulnerability has been reported in version 3.4.04. Other versions may also be affected.
SOLUTION: Edit the source code to ensure that input is properly sanitised.
I'm going to package up a new version (v3.4.05) probably end of this week, or this weekend that will include this fix, plus the other Security Fix that was released since we released v3.4.04. It will also include the few other bug fixes that are listed in this forum.