InstantForum.NET Multiple Cross-Site Scripting Vulnerability

2007.01.22
Credit: Doz
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 6.8/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

InstantForum.NET Multiple Cross-Site Scripting Vulnerability ASP.NET based discussion forum. Full administration, WYSIWYG editor, Permission based forum access, Assign forum moderators, VS.NET solution available. InstantForum.NET is the most comprehensive, high performance ASP.NET & SQL Server discussion forum solution available allowing you to easily set-up, customize and maintain demanding online communities or internal collaboration environments. Hackers Center Security Group (http://www.hackerscenter.com) Credit: Doz Risk: Medium vendor: www.instantasp.co.uk Class: Cross-Site Scripting Remote: Yes Version: InstantForum.NET v4.1.0 Exploit: An attacker can exploit these issues via a web client. XSS example: http://www.site.com/Forums-Path/Logon.aspx?SessionID=[xss] http://www.site.com/Forums-Path/Members1.aspx?Username=[xss] http://www.site.com/Forums-Path/Members1.aspx?Update=[xss] An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top