exploit-db-mirror/platforms/cgi/webapps/25051.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

5 lines
No EOL
555 B
Text
Executable file

source: http://www.securityfocus.com/bid/12097/info
WPKontakt is reported prone to a potential script execution vulnerability. It is reported that this issue may allow remote attackers to execute arbitrary script code on a vulnerable computer, which may lead to various attacks. Arbitrary script code may be executed on a target system in the event that a specially message containing a specially malformed email address containing a JavaScript URI is received.
test@"style="background-image:url(javascript:alert(%22You%20are%20owned!%22>))".wp.pl