exploit-db-mirror/exploits/php/webapps/37415.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

30 lines
No EOL
1.3 KiB
Text

source: https://www.securityfocus.com/bid/54045/info
Multiple Webify products are prone to multiple HTML-injection and local file-include vulnerabilities because they fail to properly sanitize user-supplied input.
Exploiting these issues could allow an attacker to execute arbitrary HTML and script code in the context of the affected browser, steal cookie-based authentication credentials, and execute arbitrary local scripts in the context of the web server process. Other attacks are also possible.
The following Webify products are vulnerable:
Webify eDownloads Cart
Webify eDownloads
Webify Project Manager
Webify Blog
Local file include:
http://www.example.com/index.php?page=[LOCAL FILE INCLUDE]
http://www.example.com/admin/index.php?page=[LOCAL FILE INCLUDE]
HTML injection:
http://www.example.com/admin/index.php?page=query [Persistent Script Code Inject via Query Value]
http://www.example.com/admin/index.php?page=addobjects [Persistent Script Code Inject via addObject name Value]
http://www.example.com/admin/index.php?page=formdesigner [Persistent Script Code Inject via former label Value]
http://www.example.com/admin/index.php?page=comments [Persistent Script Code Inject via Comment text & name Value]
http://www.example.com/admin/index.php?page=submissions [Persistent Script Code Inject via submission name Value]