by r0t,der4444,cembo,VietMafia

Friday, December 02, 2005

icq.com XSS vuln.

icq.com XSS vuln.

Vuln. dicovered by : r0t
Date: 2 dec. 2005

Vuln. Description:
Input passed to the "uSearchString" parameter in "search_results.php" isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.


example:
/boards/search_results.php?uSearchString=
%3Cscript%3Ealert%28%27r0t%27%29%3C%2Fscript%3E

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew