header-logo
Suggest Exploit
vendor:
GWExtranet
by:
Unknown
7.5
CVSS
HIGH
HTML-injection
79
CWE
Product Name: GWExtranet
Affected Version From: 3
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:vendor:gwextranet:3.0
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

HTML-injection vulnerabilities in GWExtranet

GWExtranet is prone to multiple HTML-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content. Attacker-supplied HTML and script code could execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and sanitization techniques to prevent HTML-injection attacks. The application should also enforce the principle of least privilege to limit the potential impact of an attacker's actions.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/26582/info

GWExtranet is prone to multiple HTML-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied input data before using it in dynamically generated content.

Attacker-supplied HTML and script code could execute in the context of the affected website, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

GWExtranet 3.0 is affected by these issues; other versions may also be vulnerable. 

http://www.example.com/GWExtranet/scp.dll/frmonth?filter=<EvilScript>
http://www.example.com/GWExtranet/scp.dll/frmonth?user=<EvilScript>
http://www.example.com/GWExtranet/scp.dll/frmonth?month=<EvilScript>
http://www.example.com/GWExtranet/scp.dll?user=USERID&template=<EvilScript>