Exploit TorrentTrader 1.08 - 'msg' HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31328
Проверка EDB
  1. Пройдено
Автор
DOMINUS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-1173
Дата публикации
2008-03-03
Код:
source: https://www.securityfocus.com/bid/28082/info


TorrentTrader is prone to an HTML-injection vulnerability because it fails to adequately sanitize user-supplied input.

Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.

NOTE: This BID was previously titled 'TorrentTrader 'msg' Parameter Cross Site Scripting Vulnerability'. Following further analysis, the title and multiple details throughout have been changed to better document the issue.

TorrentTrader Classic 1.08 is affected; other versions may also be vulnerable.

http://www.example.com/account-inbox.php?msg=<script>alert(document.cookie)</script>&receiver=<username>
 
Источник
www.exploit-db.com

Похожие темы