exploit-db-mirror/exploits/asp/webapps/21924.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

11 lines
No EOL
745 B
Text

source: https://www.securityfocus.com/bid/5928/info
SurfControl SuperScout Email Filter comes with a web-based interface to provide remote access to administrative facilities.
The web-based admin interface is prone to cross-site scripting attacks.
It is possible to create a link containing malicious HTML and script code to certain pages in the interface. When this link is visited by a web user, the attacker-supplied script code will execute in user's web client in the security context of the web interface.
This may potentially be exploited to steal cookie-based authentication credentials from legitimate users of the interface.
http://www.example.com/web/msgError.asp?Redirect=loginhtm&Reason=<script>alert(document.cookie);</script>