exploit-db-mirror/exploits/windows/remote/21554.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

9 lines
No EOL
625 B
Text

source: https://www.securityfocus.com/bid/5025/info
Imatix Xitami is a webserver for Microsoft Windows operating systems.
It is possible for attackers to construct a URL that will cause scripting code to be embedded in error pages.
Xitami fails to check URLs for the presence of script commands when generating error pages returned from sample scripts that use Errors.gsl, allowing attacker supplied code to execute. As a result, when an innocent user follows such a link, the script code will execute within the context of the hosted site.
http://www.<IMG%20SRC=""%20ONERROR="alert(document.cookie)">.target.com/error404