header-logo
Suggest Exploit
vendor:
Xerver
by:
SecurityFocus
7.5
CVSS
HIGH
Multiple Input Validation Vulnerabilities
79
CWE
Product Name: Xerver
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Xerver Multiple Input Validation Vulnerabilities

Xerver is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit a vulnerability to disclose the contents of any Web accessible script. Information obtained may aid in further attacks. An attacker can retrieve a directory listing of any Web accessible folders. Information obtained may aid in further attacks. An attacker can perform cross-site scripting attacks. This may be leveraged to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in the application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/15135/info
  
Xerver is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
  
An attacker can exploit a vulnerability to disclose the contents of any Web accessible script. Information obtained may aid in further attacks.
  
An attacker can retrieve a directory listing of any Web accessible folders. Information obtained may aid in further attacks.
  
An attacker can perform cross-site scripting attacks. This may be leveraged to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

http://www.example.com/%00/<script>alert('X.S.S')</script>