{"id": "PACKETSTORM:53679", "type": "packetstorm", "bulletinFamily": "exploit", "title": "instant-xss.txt", "description": "", "published": "2007-01-16T00:00:00", "modified": "2007-01-16T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/53679/instant-xss.txt.html", "reporter": "DoZ", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:16:50", "viewCount": 14, "enchantments": {"score": {"value": -0.4, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.4}, "sourceHref": "https://packetstormsecurity.com/files/download/53679/instant-xss.txt", "sourceData": "`InstantForum.NET Multiple Cross-Site Scripting Vulnerability \n \nASP.NET based discussion forum. Full administration, WYSIWYG editor, Permission based forum access, Assign forum moderators, VS.NET solution available. InstantForum.NET is the most comprehensive, high performance ASP.NET & SQL Server discussion forum solution available allowing you to easily set-up, customize and maintain demanding online communities or internal collaboration environments. \n \n \nHackers Center Security Group (http://www.hackerscenter.com) \n \nCredit: Doz \n \n \nRisk: Medium \nvendor: www.instantasp.co.uk \n \n \nClass: Cross-Site Scripting \nRemote: Yes \n \n \nVersion: InstantForum.NET v4.1.0 \nExploit: An attacker can exploit these issues via a web client. \n \n \nXSS example: \n \nhttp://www.site.com/Forums-Path/Logon.aspx?SessionID=[xss] \nhttp://www.site.com/Forums-Path/Members1.aspx?Username=[xss] \nhttp://www.site.com/Forums-Path/Members1.aspx?Update=[xss] \n \n \nAn attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \n`\n", "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645369872, "score": 1659769055}}