exploit-db-mirror/exploits/java/webapps/21946.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

9 lines
No EOL
601 B
Text

source: https://www.securityfocus.com/bid/5997/info
vBulletin does not filter HTML tags from URI parameters, making it prone to cross-site scripting attacks.
As a result, it is possible for a remote attacker to create a malicious link containing script code which will be executed in the browser of a legitimate user, in the context of the website running vBulletin.
This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software.
http://<victim>/usercp.php?s=[Session ID]"><Script>alert(document.cookie);</Script>