exploit-db-mirror/platforms/php/webapps/21906.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

11 lines
No EOL
722 B
Text
Executable file

source: http://www.securityfocus.com/bid/5890/info
Reportedly, phpLinkat is prone to cross site scripting attacks.
An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link containing HTML and script code. The attacker-supplied HTML and script code may be executed on a web client in the context of the site hosting phpLinkat.
Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.
http://target/showcat.php?catid=<Script>JavaScript:alert('test');</Script>
http://target/addyoursite.php?catid=<Script>JavaScript:alert('test');</Script>