exploit-db-mirror/exploits/cgi/webapps/21495.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

9 lines
No EOL
597 B
Text

source: http://www.securityfocus.com/bid/4888/info
CGIScript.net provides various webmaster related tools and is maintained by Mike Barone and Andy Angrick.
A vulnerability has been reported in the csPassword.cgi script developed by CGIScript.net. It is possible for an authenticated user to add directives and make changes to the generated .htaccess file.
javascript:void(document.form1.title.outerHTML="<textarea name=title>&lt;/textarea&gt;");
Adding the javascript as part of the URL will change the text field into a textbox allowing users to enter newlines and other characters.