Exploit Xinha 0.96 - 'spell-check-savedicts.php' Multiple HTML Injection Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
35436
Проверка EDB
  1. Пройдено
Автор
JOHN LEITCH
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2011-5267
Дата публикации
2011-03-10
Код:
source: https://www.securityfocus.com/bid/46825/info

Xinha is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input.

Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.

Xinha 0.96.1 is vulnerable; prior versions may also be affected. Note that applications that use vulnerable versions of Xinha may also be affected. 

http://www.example.com/wikiwig5.01/_wk/Xinha/plugins/SpellChecker/spell-check-savedicts.php?to_r_list=%3Cscript%3Ealert(0)%3C%2fscript%3E
 
Источник
www.exploit-db.com

Похожие темы