exploit-db-mirror/platforms/php/webapps/32782.txt
Offensive Security cc553d1147 DB: 2015-04-20
11 new exploits
2015-04-20 12:44:13 +00:00

9 lines
No EOL
525 B
Text
Executable file
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

source: http://www.securityfocus.com/bid/33677/info
FotoWeb is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input.
Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials.
FotoWeb 6.0 is vulnerable; other versions may also be affected.
http://www.example.com/fotoweb/cmdrequest/Login.fwx?s="><script>alert(â??0wn3dâ?)</script>