header-logo
Suggest Exploit
vendor:
ht://Dig
by:
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: ht://Dig
Affected Version From: ht://Dig 3.2.0b6
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Cross-Site Scripting Vulnerability in ht://Dig

The ht://Dig software is vulnerable to a cross-site scripting (XSS) vulnerability. This occurs due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability to execute arbitrary HTML or script code in a user's browser session within the context of the affected site. This can lead to the theft of cookie-based authentication credentials and enable the attacker to launch further attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied input before using it in HTML output. Implementing strong input validation and output encoding can help prevent XSS attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26610/info

ht://Dig is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue allows an attacker to execute arbitrary HTML or script code in a user's browser session in the context of an affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

This issue affects ht://Dig 3.2.0b6; other versions may also be vulnerable. 

http://www.example.com/cgi-bin/htsearch?config=&restrict=&exclude=&method=and&format=builtin-long&sort=<script>alert("foo")</script>&words=foo