P.A.I.D v2.2

2006.06.19
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

P.A.I.D v2.2 Homepage: http://www.webexceluk.net Effected files: faq.php input form of logging in. index.php The input forms of logging into My Account do not sanatize user input. For PoC of a XSS attack simply put in: "><IMG SRC=javascript:alert('XSS')><" It also seems when logging in, even if your details are incorrect and you browse normal parts of the site like the FAQ or the Contact Us page etc, a message will be output in the top righton the screen with the text "Welcome back,username", as if you were successfully logged in. faq.php XSS Vulnerability via URLinjection: http://www.example.com/paid/faq.php?farea=2"><img%20src=lol.jpg><" index.php XSS Vulnerability via read variable: http://example.com/paid/index.php?read=<IMG%20SRC=javascript:alert('XSS' )>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top