exploit-db-mirror/platforms/php/webapps/30161.txt
Offensive Security 6bd122cd4b Updated 12_12_2013
2013-12-12 21:02:26 +00:00

9 lines
No EOL
668 B
Text
Executable file

source: http://www.securityfocus.com/bid/24363/info
Atom PhotoBlog is prone to multiple input-validation vulnerabilities because it fails to adequately sanitize user-supplied input data before rendering it in a user's browser. These issues include multiple HTML-injection vulnerabilities and a cross-site scripting vulnerability.
Attackers could exploit these issues to steal cookie-based authentication credentials from legitimate users of the site; other attacks are also possible.
Versions prior to Atom PhotoBlog 1.0.9.1 are vulnerable.
http://www.example.com/atomphotoblog/atomPhotoBlog.php?do=index&tag=<ScRiPt%20%0a%0d>alert(1566213939)%3B</ScRiPt>