I-Gallery Multiple Input Validation Vulnerabilities

To exploit the HTML-injection issue, an attacker can use a web client. To exploit the cross-site scripting issues, the attacker must entice an unsuspected victim into following a malicious URI.

These proof-of-concept URIs are available:

http://target/path/igallery.asp?n=[XSS]
http://target/path/igallery.asp&d=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus