Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
N/A | CWE-XX | $X,XXX | High/Low/Medium/Critical |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | Critical/High/Medium/Low | Remote/Local | 2006-06-28 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 0.02192 | 0.50148 |
P.A.I.D v2.2 Homepage: http://www.webexceluk.net Effected files: faq.php input form of logging in. index.php The input forms of logging into My Account do not sanatize user input. For PoC of a XSS attack simply put in: "><IMG SRC=javascript:alert('XSS')><" It also seems when logging in, even if your details are incorrect and you browse normal parts of the site like the FAQ or the Contact Us page etc, a message will be output in the top righton the screen with the text "Welcome back,username", as if you were successfully logged in. faq.php XSS Vulnerability via URLinjection: http://www.example.com/paid/faq.php?farea=2"><img%20src=lol.jpg><" index.php XSS Vulnerability via read variable: http://example.com/paid/index.php?read=<IMG%20SRC=javascript:alert('XSS' )>
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.