header-logo
Suggest Exploit
vendor:
miniPortail
by:
SecurityFocus
8.3
CVSS
HIGH
cross-site scripting
79
CWE
Product Name: miniPortail
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

cross-site scripting vulnerability in miniPortail

A vulnerability exists due to insufficient sanitization of some user-supplied values. Specifically, malicious HTML code is not sanitized from a URI parameter passed to miniPortail. An attacker could exploit this issue to execute arbitrary HTML code in the browser of a remote user who follows a malicious link.

Mitigation:

Input validation should be used to ensure that user-supplied values are properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8504/info

cross-site scripting vulnerability has been reported for miniPortail. The vulnerability exists due to insufficient sanitization of some user-supplied values. Specifically, malicious HTML code is not sanitized from a URI parameter passed to miniPortail.

An attacker could exploit this issue to execute arbitrary HTML code in the browser of a remote user who follows a malicious link. 

http://www.example.com/?lng=<script>