ClipBucket 'Username' Parameter Cross-Site Scripting Vulnerability

Summary
This host is installed with ClipBucket and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Impact Level: Application
Solution
Upgrade to ClipBucket version 2.7 beta or later. For updates refer http://sourceforge.net/projects/clipbucket/files/Clipbucket%20V2.7/
Insight
Input passed via the HTTP POST parameter 'Username' to 'signup.php' script is not properly sanitised before returning to the user.
Affected
ClipBucket version 2.6 revision 738, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References