exploit-db-mirror/platforms/php/webapps/22384.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

11 lines
No EOL
728 B
Text
Executable file

source: http://www.securityfocus.com/bid/7140/info
It has been reported that Siteframe does not sufficiently filter user supplied URI parameters on Siteframe pages.
As a result of this deficiency, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. All code will be executed within the context of the website running Siteframe.
This may allow for theft of cookie-based authentication credentials and other attacks.
This vulnerability was reported to affect Siteframe version 2.2.4, it is not currently known if other versions are affected.
http://www.example.com/search.php?searchfor="><script>alert('test');</script>