Cuteflow Bin 1.5 - pages/editmailinglist_step1.php language Parameter XSS

2008-03-29T00:00:00
ID EDB-ID:31557
Type exploitdb
Reporter hadihadi
Modified 2008-03-29T00:00:00

Description

Cuteflow Bin 1.5 pages/editmailinglist_step1.php language Parameter XSS. CVE-2008-1630. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/28500/info
 
CuteFlow Bin is prone to multiple input-validation vulnerabilities because it fails to sufficiently sanitize user-supplied data. The issues include a SQL-injection vulnerability and multiple cross-site scripting vulnerabilities.
 
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
 
These issues affect CuteFlow Bin 1.5.0; other versions may also be affected. 

http://www.example.com/[path]//pages/editmailinglist_step1.php?language=<script>alert(222)</script>