9 lines
No EOL
611 B
Text
9 lines
No EOL
611 B
Text
source: https://www.securityfocus.com/bid/4720/info
|
|
|
|
SGDynamo is a web application engine for Microsoft Windows operating systems.
|
|
|
|
Script code is not filtered from URL parameters that are used as output by the SGDynamo program. This may enable an attacker to inject script code into a malicious link to the program. The script code will be executed in the browser of a user who visits the link, in the context of the site running the program.
|
|
|
|
This may enable the attacker to steal cookie-based authentication credentials from legitimate users.
|
|
|
|
http://target/sgdynamo.exe?HTNAME=<script>alert("test")</script> |