12 lines
No EOL
704 B
Text
12 lines
No EOL
704 B
Text
source: https://www.securityfocus.com/bid/7310/info
|
|
|
|
It has been reported that user-supplied input to phPay is not sufficiently sanitized. This lack of sanitization provides an opportunity for an attacker to launch cross-site scripting attacks.
|
|
|
|
It is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user.
|
|
|
|
Any attacker-supplied code will be executed within the context of the website running phPay.
|
|
|
|
While this vulnerability has been reported to affect phPay version 2.02, previous versions may also be affected.
|
|
|
|
http://www.example.com/search.php?sess=your_session_id&lookfor=<script>alert
|
|
(document.cookie)</script> |