header-logo
Suggest Exploit
vendor:
phPay
by:
SecurityFocus
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: phPay
Affected Version From: 02.02
Affected Version To: 02.02
Patch Exists: YES
Related CWE: N/A
CPE: //a:phpay
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

phPay Cross-Site Scripting Vulnerability

It has been reported that user-supplied input to phPay is not sufficiently sanitized. This lack of sanitization provides an opportunity for an attacker to launch cross-site scripting attacks. It is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. Any attacker-supplied code will be executed within the context of the website running phPay.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7310/info

It has been reported that user-supplied input to phPay is not sufficiently sanitized. This lack of sanitization provides an opportunity for an attacker to launch cross-site scripting attacks.

It is possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user.

Any attacker-supplied code will be executed within the context of the website running phPay.

While this vulnerability has been reported to affect phPay version 2.02, previous versions may also be affected. 

http://www.example.com/search.php?sess=your_session_id&lookfor=<script>alert
(document.cookie)</script>