vendor:
FAQ-O-Matic
by:
SecurityFocus
7.5
CVSS
HIGH
URL Parameter Script Code Injection
79
CWE
Product Name: FAQ-O-Matic
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Unix
2002
FAQ-O-Matic URL Parameter Script Code Injection Vulnerability
FAQ-O-Matic does not sufficiently filter script code from URL parameters. It is possible to create a malicious link containing arbitrary script code. When a legitimate user browses the malicious link, the script code will be executed in the user's browser in the context of the website running Faq-O-Matic. As a result, it may be possible for a remote attacker to steal cookie-based authentication credentials from a legitimate user of the service.
Mitigation:
Ensure that all user-supplied input is properly sanitized and filtered before being used in the application.