Re: [KAPDA::#27] - Runcms 1.x Cross_Site_Scripting vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[ADDITIONS AND CORRECTIONS]

Detail and PoC :
--------------------

The application does not validate the "lid" variable upon submission to ratelink.php(*) and ratefile.php.

h**p://[target]/public/modules/mylinks/ratelink.php?lid={number}">[code]

h**p://[target]/public/modules/downloads/ratefile.php?lid={number}">[code]

--------------------
(*)ratelink.php was later found to be vulnerable too.

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux