header-logo
Suggest Exploit
vendor:
DCP-Portal
by:
SecurityFocus
7.5
CVSS
HIGH
Script Code Execution
79
CWE
Product Name: DCP-Portal
Affected Version From: 5.3.2001
Affected Version To: 5.3.2001
Patch Exists: NO
Related CWE: N/A
CPE: a:dcp-portal:dcp-portal
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

DCP-Portal URI Parameter Script Code Execution Vulnerability

It has been reported that DCP-Portal does not sufficiently filter URI parameters supplied to the DCP-Portal 'calender' script. As a result of this deficiency, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. All code will be executed within the context of the website running DCP-Portal. This may allow for theft of cookie-based authentication credentials and other attacks.

Mitigation:

Filter user input and validate all parameters supplied to the DCP-Portal 'calender' script.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7144/info

It has been reported that DCP-Portal does not sufficiently filter URI parameters supplied to the DCP-Portal 'calender' script. 

As a result of this deficiency, it is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. All code will be executed within the context of the website running DCP-Portal. 

This may allow for theft of cookie-based authentication credentials and other attacks.

This vulnerability was reported to affect DCP-Portal version 5.3.1, it is not currently known if other versions are affected.

http://www.example.com/calendar.php?year=<script>alert(document.cookie);</script>&month=03&day=05