header-logo
Suggest Exploit
vendor:
Plesk Reloaded
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: Plesk Reloaded
Affected Version From: Plesk Reloaded 7.1 (demo version)
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:plesk:plesk_reloaded:7.1
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting Vulnerability in Plesk Reloaded

The application fails to properly sanitize user-supplied URI input, allowing a remote attacker to create a malicious URI link containing hostile HTML and script code. When followed, this link can render the hostile code in the victim user's web browser, potentially leading to theft of authentication credentials or other attacks.

Mitigation:

Proper input validation and sanitization should be implemented to prevent the execution of malicious code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11024/info

It is reported that Plesk Reloaded may be affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input.

This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

This issue was identified in the demo version of Plesk Reloaded 7.1. It is likely that other versions are affected as well. 

http://www.example.com:8443/login_up.php3?login_name="><script>alert(document.cookie)</script><"&passwd=TheSur