9 lines
No EOL
448 B
Text
9 lines
No EOL
448 B
Text
source: https://www.securityfocus.com/bid/40519/info
|
|
|
|
TPO Duyuru Scripti is prone to an authentication-bypass vulnerability because it fails to adequately verify user-supplied input used for cookie-based authentication.
|
|
|
|
Attackers can exploit this vulnerability to gain administrative access to the affected application, which may aid in further attacks.
|
|
|
|
The following example data is available:
|
|
|
|
javascript:document.cookie = "kullanici=; path=/"; |