Exploit Xomol CMS 1.2 - '/index.php' HTML Injection / Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32021
Проверка EDB
  1. Пройдено
Автор
JULIAN RODRIGUEZ
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-3202
Дата публикации
2008-07-09
Код:
source: https://www.securityfocus.com/bid/30156/info

Xomol CMS is prone to an HTML-injection vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, or launch other attacks.

Xomol CMS 1.2 is vulnerable; other versions may also be affected. 

http://www.example.com/index.php?op=tellafriend&current_url=">/><script>alert(/xssed/)</script>
 
Источник
www.exploit-db.com

Похожие темы