[eVuln.com] email XSS in SimpLISTic

看板Bugtraq作者時間15年前 (2010/11/25 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
New eVuln Advisory: email XSS in SimpLISTic Summary: http://evuln.com/vulns/145/summary.html Details: http://evuln.com/vulns/145/description.html -----------Summary----------- eVuln ID: EV0145 Software: SimpLISTic Vendor: Mrcgiguy Version: 2.0 Critical Level: low Type: Cross Site Scripting Status: Unpatched. No reply from developer(s) PoC: Available Solution: Available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- XSS vulnerability found in email.cgi script. 'email' parameter is not properly sanitized. 'email' parameter pass through similar filter but not XSS filter. Any user may add email containing special code. "List addresses" page in Admin panel is vulnerable. --------PoC/Exploit-------- PoC code is available at: http://evuln.com/vulns/145/exploit.html ---------Solution---------- Available at http://evuln.com/vulns/145/solution.html ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/xss/ - recent xss vulns.
文章代碼(AID): #1CxLBY91 (Bugtraq)