OpenX contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate the 'parent' parameter upon submission to the /www/admin/plugin-index.php script. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
Remote / Network Access
Loss of Integrity
Patch / RCS
Currently, there are no known workarounds or upgrades to correct this issue. However, a patch has been committed to the SVN repository in revision 81823 that addresses this vulnerability. Until it is incorporated into the next release of the software, manually patching an existing installation is the only known available solution. Check the vendor advisory or solution URL in the references section.