exploit-db-mirror/platforms/php/webapps/32783.txt
Offensive Security 5e2fc10125 DB: 2016-09-03
2016-09-03 13:13:25 +00:00

10 lines
No EOL
546 B
Text
Executable file
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

source: http://www.securityfocus.com/bid/33677/info
FotoWeb is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials.
FotoWeb 6.0 is vulnerable; other versions may also be affected.
http://www.example.com/fotoweb/Grid.fwx?&search=<script>alert("0wn3d�)</script> and (FQYFT
contains(JPEG))