Form Sender 1.0 – ‘Processform.php3?Failed’ Cross-Site Scripting

Form Sender 1.0 – ‘Processform.php3?Failed’ Cross-Site Scripting

漏洞ID 1055263 漏洞类型
发布时间 2005-07-19 更新时间 2005-07-19
图片[1]-Form Sender 1.0 – ‘Processform.php3?Failed’ Cross-Site Scripting-安全小百科CVE编号 N/A
图片[2]-Form Sender 1.0 – ‘Processform.php3?Failed’ Cross-Site Scripting-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/26015
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/14326/info

A cross-site scripting vulnerability affects Form Sender. This issue is due to a failure of the application to properly sanitize user-supplied URI input that will be output in dynamically generated Web pages.

This may facilitate the theft of cookie-based authentication credentials as well as other attacks. 

http://[target]/[path]/processform.php3?failed=<script>alert(document.cookie)</script>

相关推荐: NAI PGP Keyserver Web Administration Interface Authentication Bypassing Vulnerability

NAI PGP Keyserver Web Administration Interface Authentication Bypassing Vulnerability 漏洞ID 1102900 漏洞类型 Configuration Error 发布时间 2…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享