header-logo
Suggest Exploit
vendor:
TDizin
by:
5.5
CVSS
MEDIUM
Cross-Site Scripting
79
CWE
Product Name: TDizin
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Cross-Site Scripting Vulnerability in TDizin

TDizin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to properly sanitize and validate user-supplied input before displaying it on a website. Implementing a web application firewall (WAF) can also help in filtering out malicious input.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/24515/info

TDizin is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

http://www.example.com/TDizin/arama.asp?ara= "><script>alert("G3");</script>&submit=+T%27ARA+