exploit-db-mirror/exploits/php/webapps/22478.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

12 lines
No EOL
704 B
Text

source: https://www.securityfocus.com/bid/7310/info
It has been reported that user-supplied input to phPay is not sufficiently sanitized. This lack of sanitization provides an opportunity for an attacker to launch cross-site scripting attacks.
It is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user.
Any attacker-supplied code will be executed within the context of the website running phPay.
While this vulnerability has been reported to affect phPay version 2.02, previous versions may also be affected.
http://www.example.com/search.php?sess=your_session_id&lookfor=<script>alert
(document.cookie)</script>