header-logo
Suggest Exploit
vendor:
Messageriescripthp
by:
SecurityFocus
7.5
CVSS
HIGH
SQL-injection and Cross-site Scripting
89
CWE
Product Name: Messageriescripthp
Affected Version From: V2.0
Affected Version To: V2.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Messageriescripthp Multiple Input Validation Vulnerabilities

Messageriescripthp is prone to multiple input-validation vulnerabilities, including SQL-injection and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation. Messageriescripthp V2.0 is vulnerable to this issue.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to execute unintended commands or access data that is not intended to be accessed.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/21513/info
   
Messageriescripthp is prone to multiple input-validation vulnerabilities, including SQL-injection and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
   
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
   
Messageriescripthp V2.0 is vulnerable to this issue.

http://www.example.com/[script_messagerie_path]/Contact/contact.php?pageName=</title>[XSS]
http://www.example.com/[script_messagerie_path]/Contact/contact.php?cssform=">[XSS]<foo