Exploit Working Resources BadBlue 1.7.3 - 'cleanSearchString()' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21599
Проверка EDB
  1. Пройдено
Автор
MATTHEW MURPHY
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2002-1683
Дата публикации
2002-07-08
Код:
source: https://www.securityfocus.com/bid/5179/info

BadBlue is a P2P file sharing application distributed by Working Resources. It is designed for use on Microsoft Windows operating systems. BadBlue is operated through a web interface, generated by an included web server running on the local system.

A variant to BID 5086 has been reported to exist. Reportedly, EXT.DLL has been re-designed to pass user input to the cleanSearchString function. Unfortunately, this function is implemented as client side javascript, and unsanitized input must be displayed on the client machine as it is passed to the cleanSearchString function.

Additionally, user supplied input is displayed as the hidden form value "a0" without being sanitized. 

"hi"'));alert("ZING!!!");document.write(cleanSearchString('a

"><script>alert("ZING!!!");</script><
 
Источник
www.exploit-db.com

Похожие темы