header-logo
Suggest Exploit
vendor:
PhotoADay
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: PhotoADay
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: No
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting Vulnerability in PhotoADay

The PhotoADay application is affected by a cross-site scripting vulnerability. This vulnerability allows a remote attacker to create a malicious URI link containing hostile HTML and script code. If a victim user follows this link, the hostile code may be executed in their web browser, potentially leading to the theft of authentication credentials or other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied input properly. Developers should implement input validation and output encoding to prevent the execution of malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11009/info

It is reported that PhotoADay is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input.

This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

All versions of PhotoADay are considered vulnerable at the moment. 

http://www.example.com/modules.php?name=Photo_A_Day&action=single&pad_selected=44%20UNION%20SELECT%20< script>alert(document.cookie);</script>