Family: CGI abuses : XSS --> Category: destructive_attack
paBox Post Icon HTML Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for post icon HTML injection vulnerability in paBox
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that is prone to a cross-
site scripting attack.
The remote host is running paBox, a web application written in PHP.
The remote version of paBox installed on the remote host does not
properly sanitize input supplied through the 'posticon' parameter used
to select a 'smilie' for a post. By exploiting this flaw, a possible hacker
can inject HTML and script code into the browser of users who view the
affected post, potentially stealing authentication cookies and
controlling how the affected application is rendered.
See also :
Unknown at this time.
Low / CVSS Base Score : 2
Click HERE for more information and discussions on this network vulnerability scan.