[HTTPCS] ClanSphere 'where' Cross Site Scripting Vulnerability

看板Bugtraq作者時間12年前 (2014/03/08 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
HTTPCS Advisory : HTTPCS127 Product : ClanSphere Version : 2011.4 Date : 2014-03-07 Criticality level : Less Critical Description : A vulnerability has been discovered in ClanSphere, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'where' parameter to '/index.php' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Page : /index.php Variables : sort=6&action=list&where=[VulnHTTPCS]&mod=users Type : XSS Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs127 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ https://www.httpcs.com/en/advisories _______________________________________________ Twitter : http://twitter.com/HTTPCS Web vulnerability scanner HTTPCS : https://www.httpcs.com/
文章代碼(AID): #1J6WbVE6 (Bugtraq)