exploit-db-mirror/platforms/php/webapps/35436.txt
Offensive Security 5a0a6520d2 Updated 12_03_2014
2014-12-03 04:52:35 +00:00

9 lines
No EOL
729 B
Text
Executable file

source: http://www.securityfocus.com/bid/46825/info
Xinha is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.
Xinha 0.96.1 is vulnerable; prior versions may also be affected. Note that applications that use vulnerable versions of Xinha may also be affected.
http://www.example.com/wikiwig5.01/_wk/Xinha/plugins/SpellChecker/spell-check-savedicts.php?to_r_list=%3Cscript%3Ealert(0)%3C%2fscript%3E