Exploit Sun Java System Identity Manager 6.0/7.0/7.1 - '/idm/account/findForSelect.jsp?resultsForm' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31005
Проверка EDB
  1. Пройдено
Автор
JAN FRY & ADRIAN PASTOR
Тип уязвимости
WEBAPPS
Платформа
JSP
CVE
cve-2008-0239
Дата публикации
2008-01-09
Код:
source: https://www.securityfocus.com/bid/27214/info
 
Sun Java System Identity Manager is prone to multiple input-validation vulnerabilities, including an HTML-injection issue and cross-site scripting issues, because it fails to adequately sanitize user-supplied input.
 
Attackers can exploit these issues to execute arbitrary HTML and script code in the context of the affected site. Successful exploits could allow an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
 
Sun Java System Identity Manager 6.0 SP1, 6.0 SP2, 6.0 SP3, 7.0, and 7.1 are vulnerable. 

https://www.example.com/idm/account/findForSelect.jsp?resultsForm=<script>alert(&#039;Running_scripting_within_the_context_of_&#039;%2bdocument.domain)</script>&predefinedQuery=name%3Astarts+with%3A%25
 
Источник
www.exploit-db.com

Похожие темы