7 lines
No EOL
497 B
Text
7 lines
No EOL
497 B
Text
source: https://www.securityfocus.com/bid/14002/info
|
|
|
|
i-Gallery is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'folder' parameter of 'folderview.asp'.
|
|
|
|
An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site.
|
|
|
|
http://www.example.com/gallery/folderview.asp?folder=<script>alert(document.cookie)</script> |