header-logo
Suggest Exploit
vendor:
W-Agora
by:
SecurityFocus
7.5
CVSS
HIGH
Script-Injection
79
CWE
Product Name: W-Agora
Affected Version From: 4.2
Affected Version To: 4.2
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

W-Agora Script-Injection Vulnerability

W-Agora is prone to a script-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated content. W-Agora can be configured to send all user information in session data; if this is the case, then attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing an attacker to steal cookie-based authentication credentials. Other attacks are also possible.

Mitigation:

Input validation should be used to ensure that user-supplied data does not include malicious HTML or script code.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17751/info

W-Agora is prone to a script-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before including it in dynamically generated content. 

W-Agora can be configured to send all user information in session data; if this is the case, then attacker-supplied HTML and script code would be able to access properties of the site, potentially allowing an attacker to steal cookie-based authentication credentials. Other attacks are also possible. 

This issue is reported to affect version 4.20; other versions may also be vulnerable.

[code]<b onMouseOver =eval(&#039;alert(/xss/)&#039;)>hi</b>[/code]