Open Constructor – ‘/data/file/edit.php?result’ Cross-Site Scripting

  • 作者: Lorenzo Cantoni
    日期: 2012-08-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/37579/
  • source: https://www.securityfocus.com/bid/54822/info
     
    Open Constructor is prone to multiple input-validation vulnerabilities because it fails to properly sanitize user-supplied input.
     
    Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
     
    Open Constructor 3.12.0 is vulnerable; other versions may also be affected. 
    
    http://www.example.com/openconstructor/data/file/edit.php?result=<script>aler('xss')</script>&id=new&ds_id=8&hybridid=&fieldid=&callback=&type=txt&name=test&description=test&fname=test&create=Save