header-logo
Suggest Exploit
vendor:
K2 Toolkit
by:
SecurityFocus
7.5
CVSS
HIGH
Remote Script Execution
79
CWE
Product Name: K2 Toolkit
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Verity K2 Toolkit Remote Script Execution Vulnerability

It has been reported that Verity K2 Toolkit does not sufficiently filter user-supplied search parameters. As a result of this reported deficiency, it may be possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user, if the link is followed. This may allow for theft of cookie-based authentication credentials and other attacks.

Mitigation:

Ensure that user-supplied search parameters are properly filtered and sanitized.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8073/info

It has been reported that Verity K2 Toolkit does not sufficiently filter user-supplied search parameters. 

As a result of this reported deficiency, it may be possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user, if the link is followed.

This may allow for theft of cookie-based authentication credentials and other attacks.

http://www.example.com/[search].jsp?[query]=><img src=javascript:alert(document.cookie)>