Exploit PostNuke 0.723 - 'user.php' UNAME Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22767
Проверка EDB
  1. Пройдено
Автор
DAVID F. MADRID
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2003-06-13
Код:
source: https://www.securityfocus.com/bid/7901/info

The PostNuke 'user.php' script does not sufficiently sanitize data supplied via URI parameters, making it prone to cross-site scripting attacks. This could allow for execution of hostile HTML and script code in the web client of a user who visits a web page that contains the malicious code.

Exploitation could allow for theft of cookie-based authentication credentials. Other attacks are also possible. 

http://www.server.com/user.php?op=confirmnewuser&module=NS-NewUser&uname=%22
%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=lucas@pelu
cas.com
 
Источник
www.exploit-db.com

Похожие темы