Exploit Tutos 1.1 - 'File_Select.php' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22818
Проверка EDB
  1. Пройдено
Автор
FRANçOIS SORIN
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2003-0481
Дата публикации
2003-06-20
Код:
source: https://www.securityfocus.com/bid/8011/info

It has been reported that Tutos does not properly handle input to the file_select script. Because of this, an attacker may be able to execute code in the browser of another user with the privileges of the vulnerable site.

http://www.example.com/tutos/file/file_select.php?msg=<hostile code>
 
Источник
www.exploit-db.com

Похожие темы