Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
WebDirector Cross-Site Scripting Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
WebDirector
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: WebDirector
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

WebDirector Cross-Site Scripting Vulnerability

The WebDirector application is vulnerable to a cross-site scripting (XSS) attack due to insufficient input sanitization. An attacker can exploit this vulnerability by injecting malicious code into the 'deslocal' parameter of the affected website's URL. When an unsuspecting user visits the manipulated URL, the injected code will be executed in their browser, allowing the attacker to perform various malicious actions such as stealing authentication credentials and launching further attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper input validation and sanitization techniques. WebDirector should ensure that all user-supplied data is properly encoded or sanitized before being displayed or processed. Additionally, it is advised to keep the application and its dependencies up to date with the latest security patches and fixes.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25166/info

WebDirector is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks. 

http://www.example.com/index.php?deslocal=[xss]