header-logo
Suggest Exploit
vendor:
RateMyPic
by:
SecurityFocus
8.8
CVSS
HIGH
Input Validation Vulnerabilities
20
CWE
Product Name: RateMyPic
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

TAL RateMyPic Multiple Input Validation Vulnerabilities

An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

Mitigation:

Input validation should be performed to ensure that untrusted data is not used to execute unintended commands.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/18230/info

TAL RateMyPic is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit these issues to execute arbitrary HTML and script code in the browser of a victim user in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials, to control how the site is rendered to the user, and to launch other attacks.

http://www.example.com/index.php?id=<IMG%20SRC=http://www.example.com/somecommand.php?somevariables=maliciouscode>